CVE-2025-53841
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-03

Last updated on: 2025-12-10

Assigner: MITRE

Description
The GC-AGENTS-SERVICE running as part of Akamai´s Guardicore Platform Agent for Windows versions prior to v49.20.1, v50.15.0, v51.12.0, v52.2.0 is affected by a local privilege escalation vulnerability. The service will attempt to read an OpenSSL configuration file from a non-existent location that standard Windows users have default write access to. This allows an unprivileged local user to create a crafted "openssl.cnf" file in that location and, by specifying the path to a custom DLL file in a custom OpenSSL engine definition, execute arbitrary commands with the privileges of the Guardicore Agent process. Since Guardicore Agent runs with SYSTEM privileges, this permits an unprivileged user to fully elevate privileges to SYSTEM level in this manner.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-03
Last Modified
2025-12-10
Generated
2026-05-07
AI Q&A
2025-12-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
akamai guardicore_platform_agent *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a local privilege escalation flaw in Akamai's Guardicore Platform Agent that allows an unprivileged local user to elevate their privileges to SYSTEM level, which is the highest privilege on Windows systems. It affects versions before 50.15.0, 51.12.0, and 52.1.1. The vulnerability does not require user interaction and has low attack complexity. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can gain full SYSTEM privileges on the affected system, potentially leading to complete control over the system. This can result in unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system availability. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should promptly apply the security updates and patches released by Akamai for all affected versions of the Guardicore Platform Agent. These patches were made available by August 31, 2025, and address the privilege escalation flaw. Ensuring your systems are updated to version 52.1.1 or later will protect against this issue. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart