Privilege Escalation
Privilege Escalation vulnerabilities allow an attacker to gain elevated access rights beyond their authorized level. This can enable unauthorized access to sensitive resources and system functions.
5
HIGH
General
Understanding Privilege Escalation
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Privilege Escalation CVEs (5)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-1790 | 5.8 | This vulnerability allows a low-privileged Windows user to gain higher-level access on a system running the Genetec Sipelia Plugin. The attacker must already be logged in with an account that has limited permissions to exploit this flaw. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2026-23111 | 0.0 | This vulnerability allows an attacker to escalate their privileges on a Linux system by exploiting a flaw in the nftables framework, which could let them access restricted resources. It requires the attacker to be an unprivileged user with access to user namespaces and nftables on systems that have certain kernel configurations enabled. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2026-1618 | 8.8 | This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2025-14349 | 8.8 | This vulnerability allows an attacker to gain higher access privileges within the FlexCity/Kiosk software, potentially letting them perform unauthorized actions. It affects versions before 1.0.36 and occurs because the software doesn't properly restrict access to critical functions. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2025-54519 | 7.3 | This vulnerability allows a local attacker to run their own code with higher privileges on a system, which could lead to full control over the affected machine. To exploit this, the attacker needs to place a malicious file in a specific location where the software looks for its necessary files. | Unknown | Exploit Available | 8 days agoFeb 12, 2026 |