Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34354: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Akamai Guardicore Platform Agent

0
High
VulnerabilityCVE-2026-34354cvecve-2026-34354cwe-367
Published: Fri May 08 2026 (05/08/2026, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Akamai
Product: Guardicore Platform Agent

Description

Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/08/2026, 16:07:52 UTC

Technical Analysis

The Akamai Guardicore Platform Agent and Zero Trust Client contain a TOCTOU race condition vulnerability (CWE-367) due to the creation of an IPC socket in a world-writable /tmp directory that accepts unauthenticated control messages. This allows an unprivileged local user to exploit the HandleSaveLogs() function by creating and manipulating log files into symbolic links pointing to arbitrary root-owned files, making them world-writable. Additionally, the gimmelogs diagnostic tool running with root privileges is vulnerable to command injection via the dbstore on Linux/macOS, enabling a second privilege escalation path. On Windows, gimmelogs lacks command injection but can write ZIP archives to unintended locations. The vulnerability affects specific versions of Akamai Guardicore Platform Agent and Zero Trust Client. The vendor provides a patch and manages remediation for this cloud service.

Potential Impact

Successful exploitation allows an unprivileged local user to escalate privileges to root by making arbitrary root-owned files world-writable and by leveraging command injection in a root-privileged diagnostic tool. This can lead to full system compromise on affected Linux and macOS systems. The vulnerability is rated high severity with a CVSS score of 7.4. No known exploits are currently reported in the wild.

Mitigation Recommendations

A patch is available for this vulnerability. Since the affected products are cloud-hosted services, the vendor manages remediation server-side. Users should verify with Akamai's official advisory and ensure their Guardicore Platform Agent and Zero Trust Client are updated to patched versions beyond those affected (GPA 7.3.1 and ZTC 6.1.5). No additional mitigation steps are indicated by the vendor advisory.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null
Is Cloud Service
true

Threat ID: 69fe067ecbff5d8610f67287

Added to database: 5/8/2026, 3:51:26 PM

Last enriched: 5/8/2026, 4:07:52 PM

Last updated: 5/9/2026, 5:24:12 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses