We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
Reserved 2025-08-01 | Published 2025-08-01 | Updated 2025-08-01 | Assigner VulnCheckCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-306 Missing Authentication for Critical Function
Ahmad Moghimi
raw.githubusercontent.com/...ws/local/agnitum_outpost_acs.rb
www.exploit-db.com/exploits/27282
www.exploit-db.com/exploits/28335
www.vulncheck.com/...utpost-internet-security-local-priv-esc
Support options