CVE-2025-53841
BaseFortify
Publication date: 2025-12-03
Last updated on: 2025-12-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| akamai | guardicore_platform_agent | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-829 | The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation flaw in Akamai's Guardicore Platform Agent that allows an unprivileged local user to elevate their privileges to SYSTEM level, which is the highest privilege on Windows systems. It affects versions before 50.15.0, 51.12.0, and 52.1.1. The vulnerability does not require user interaction and has low attack complexity. [1]
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain full SYSTEM privileges on the affected system, potentially leading to complete control over the system. This can result in unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system availability. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should promptly apply the security updates and patches released by Akamai for all affected versions of the Guardicore Platform Agent. These patches were made available by August 31, 2025, and address the privilege escalation flaw. Ensuring your systems are updated to version 52.1.1 or later will protect against this issue. [1]