A low‑privileged local attacker who gains access to the...
High severity
Unreviewed
Published
Mar 9, 2026
to the GitHub Advisory Database
•
Updated Mar 9, 2026
Description
Published by the National Vulnerability Database
Mar 9, 2026
Published to the GitHub Advisory Database
Mar 9, 2026
Last updated
Mar 9, 2026
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
References