CVE-2026-34354
Received Received - Intake
Akamai Guardicore Platform Agent Local Privilege Escalation

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: MITRE

Description
Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
akamai guardicore_platform_agent From 7.0 (inc) to 7.3.1 (inc)
akamai zero_trust_client From 6.0 (inc) to 6.1.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows local privilege escalation to root by unprivileged users, potentially enabling unauthorized access to sensitive data or system controls.

Such unauthorized privilege escalation and potential data exposure could lead to non-compliance with standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive information.


Can you explain this vulnerability to me?

This vulnerability affects the Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS. It is a time-of-check to time-of-use (TOCTOU) based local privilege escalation issue. The GPA service creates an inter-process communication (IPC) socket in the world-writable /tmp directory and accepts unauthenticated IPC control messages. An attacker can exploit the HandleSaveLogs() function by creating a log file and then manipulating it into a symbolic link pointing to a targeted file. This allows an unprivileged local user to make arbitrary root-owned files world-writable.

Additionally, a diagnostic collection tool called gimmelogs, which runs with root privileges, is vulnerable to command injection from the dbstore, providing a second vector for privilege escalation. On Windows, while gimmelogs does not have the command injection issue, it can write a ZIP archive to an unintended location.

The affected versions are Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.


How can this vulnerability impact me? :

This vulnerability can allow an unprivileged local user to escalate their privileges to root level on affected systems. Specifically, it enables attackers to make root-owned files world-writable, potentially compromising system integrity and security.

The command injection vulnerability in the gimmelogs tool further increases the risk by allowing attackers to execute arbitrary commands with root privileges.

Overall, exploitation of this vulnerability can lead to full system compromise, unauthorized access to sensitive data, and disruption of normal operations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS, specifically versions GPA 7.0 through 7.3.1 and Zero Trust Client 6.0 through 6.1.5. Detection would focus on identifying these versions installed on your systems.

Since the vulnerability exploits a TOCTOU issue with an IPC socket in the world-writable /tmp directory and unauthenticated IPC control messages, you can check for the presence of the GPA service and its IPC socket in /tmp.

  • Check for the GPA service process: `ps aux | grep guardicore`
  • Look for IPC sockets in /tmp related to GPA: `ls -l /tmp | grep guardicore` or `ss -xl | grep /tmp`
  • Verify installed package versions for Akamai Guardicore Platform Agent and Zero Trust Client to confirm if they fall within the vulnerable versions.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Akamai Guardicore Platform Agent and Zero Trust Client to versions later than those affected (beyond GPA 7.3.1 and Zero Trust Client 6.1.5) once patches are available.

Until patches are applied, restrict access to the /tmp directory to prevent exploitation of the world-writable IPC socket, and monitor for suspicious activity related to the GPA service.

Additionally, limit local user permissions to reduce the risk of local privilege escalation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart