Plattform
other
Komponente
runzero-platform
Behoben in
4.0.260202.0
CVE-2026-5373 describes a Privilege Escalation vulnerability within the runZero Platform. This flaw allows all-organization administrators to elevate accounts to superuser status, bypassing intended access controls. The vulnerability impacts versions from 0.0.0 through 4.0.260202.0 and has been resolved in version 4.0.260202.0.
The primary impact of CVE-2026-5373 is the potential for unauthorized access and control within the runZero Platform. An attacker, posing as an all-organization administrator, could exploit this vulnerability to promote any account to superuser status. This grants them complete administrative privileges, enabling them to modify configurations, access sensitive data, and potentially compromise the entire environment. The blast radius extends to any data or systems managed by the runZero Platform, as a superuser has unrestricted access. This vulnerability highlights a critical failure in privilege management, allowing for significant lateral movement within the platform.
CVE-2026-5373 was publicly disclosed on 2026-04-07. No public proof-of-concept (PoC) code is currently available. The vulnerability is classified as HIGH severity with a CVSS score of 8.1. It is not currently listed on the CISA KEV catalog. Active exploitation is not confirmed at this time, but the ease of exploitation if an attacker gains administrator access warrants immediate attention.
Organizations heavily reliant on runZero Platform for asset discovery and management are at significant risk. Specifically, deployments with a large number of all-organization administrators or those lacking robust access control policies are particularly vulnerable. Shared hosting environments utilizing runZero also pose an increased risk due to potential cross-tenant access.
disclosure
Exploit-Status
EPSS
0.03% (8% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-5373 is to immediately upgrade the runZero Platform to version 4.0.260202.0 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing stricter access controls and multi-factor authentication for all administrator accounts to limit the potential impact of a compromised account. Regularly review user permissions and audit logs for any suspicious activity. While a WAF or proxy cannot directly mitigate this vulnerability, they can help detect and block malicious requests attempting to exploit it.
Aktualisieren Sie die runZero Platform auf Version 4.0.260202.0 oder höher, um die Privilege-Escalation-Schwachstelle zu beheben. Dieses Update behebt ein Problem, das es Organisation-Administratoren ermöglichte, Konten in Superuser-Status zu befördern, was die Systemsicherheit gefährden könnte.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-5373 is a HIGH severity vulnerability allowing all-organization administrators to promote accounts to superuser status in runZero Platform, potentially granting unauthorized access.
If you are running runZero Platform versions 0.0.0–4.0.260202.0, you are potentially affected by this vulnerability. Upgrade immediately.
Upgrade to version 4.0.260202.0 or later to remediate the vulnerability. Review administrator permissions and implement MFA.
As of now, there are no confirmed reports of active exploitation, but the HIGH CVSS score warrants vigilance.
Refer to the official runZero security advisory for detailed information and updates: [https://www.runzero.io/security/advisories](https://www.runzero.io/security/advisories)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.