Impact
The Guardicore Platform Agent contains a TOCTOU local privilege escalation flaw that allows any non-root user to create or modify files as root. The flaw arises because the GPA service creates an IPC socket in a world-writable /tmp location and accepts unauthenticated control messages. In the HandleSaveLogs() routine, a privileged process can be tricked into writing to a path that is replaced by a user-created symlink, turning the operation into a privileged write. Additionally, the diagnostic tool gimmelogs, which runs as root, is vulnerable to command injection via the dbstore interface, providing a second escalation route.
Affected Systems
Affected products are the Akamai Guardicore Platform Agent versions 7.0 through 7.3.1 and the Akamai Zero Trust Client versions 6.0 through 6.1.5. The vulnerability exists on Linux and macOS deployments; on Windows the gimmelogs component does not allow command injection but can write ZIP archives to unintended locations.
Risk and Exploitability
The overall severity is a CVSS score of 7.4. The EPSS score is not available, but the absence of a CISA KEV listing suggests no known widespread exploitation yet. The attack vector is strictly local; an attacker must already have an unprivileged user account on the affected host. Exploitation requires only standard user privileges to create the malicious symlink or supply a crafted dbstore payload, and then the GPA service or gimmelogs process will perform the privileged write or command execution. Because the GPA IPC socket is world‑writable and unauthenticated, the vulnerability is highly exploitable once an adversary gains local foothold.
OpenCVE Enrichment