CVE-2026-41085
Awaiting Analysis Awaiting Analysis - Queue
Privilege Escalation in Thermo Fisher Torrent Suite Dx

Publication date: 2026-05-18

Last updated on: 2026-05-18

Assigner: MITRE

Description
Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of specific system interfaces.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-18
Last Modified
2026-05-18
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thermo_fisher_scientific torrent_suite_dx to 5.14.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Thermo Fisher Scientific Torrent Suite Dx through version 5.14.2. It is a privilege escalation flaw that allows an authenticated user who initially has limited access privileges to exploit specific system interfaces and gain unauthorized administrator-level privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated user with limited privileges to escalate to administrator-level access, potentially leading to unauthorized access to sensitive data and system controls.

Such unauthorized privilege escalation could result in violations of data protection and privacy regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive information.

Therefore, exploitation of this vulnerability may compromise compliance with these standards by undermining the integrity and confidentiality of protected data.


How can this vulnerability impact me? :

The impact of this vulnerability is significant because it allows a user with limited privileges to escalate their access to administrator-level privileges. This can lead to unauthorized control over the system, potentially resulting in data compromise, system manipulation, or disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart