<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(akamai.com) Akamai Mitigates Local Privilege Escalation Vulnerability in Guardicore Platform Agent for macOS and Linux]]></title><description><![CDATA[<p>(akamai.com) Akamai Mitigates Local Privilege Escalation Vulnerability in Guardicore Platform Agent for macOS and Linux</p><p>Critical local privilege escalation flaw (CVE-2026-34354) patched in Akamai Guardicore Platform Agent for macOS/Linux. Exploitation via TOCTOU in HandleSaveLogs() enables symlink attacks on root-owned files, plus command injection in gimmelogs diagnostic tool.</p><p>In brief - Akamai fixed a severe local privilege escalation vulnerability in Guardicore Agent for macOS/Linux. Attackers could manipulate symlinks or inject commands to escalate privileges. Patch immediately.</p><p>Technically - CVE-2026-34354 involves a TOCTOU race condition in HandleSaveLogs() where IPC sockets in /tmp allow symlink attacks on root files. The gimmelogs tool also had command injection via dbstore. Local access required; remote exploitation not possible. Updates mitigate both vectors.</p><p>Source: <a href="https://www.akamai.com/blog/security-research/2026/may/advisory-cve-2026-34354-guardicore-local-privilege-escalation" rel="nofollow noopener"><span>https://www.</span><span>akamai.com/blog/security-resea</span><span>rch/2026/may/advisory-cve-2026-34354-guardicore-local-privilege-escalation</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4aa12de5-52d6-4614-a5ac-021343f3f016/akamai.com-akamai-mitigates-local-privilege-escalation-vulnerability-in-guardicore-platform-agent-for-macos-and-linux</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:28:14 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4aa12de5-52d6-4614-a5ac-021343f3f016.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 15:25:21 GMT</pubDate><ttl>60</ttl></channel></rss>