A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 01 Aug 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service. | |
Title | Agnitum Outpost Internet Security Local Privilege Escalation | |
Weaknesses | CWE-22 CWE-306 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-01T20:37:55.129Z
Updated: 2025-08-04T13:50:49.631Z
Reserved: 2025-08-01T13:23:23.725Z
Link: CVE-2013-10046

Updated: 2025-08-04T13:50:41.417Z

Status : Awaiting Analysis
Published: 2025-08-01T21:15:26.190
Modified: 2025-08-04T15:06:15.833
Link: CVE-2013-10046

No data.