CVE-2026-34354: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Akamai Guardicore Platform Agent
Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.
AI Analysis
Technical Summary
The Akamai Guardicore Platform Agent and Zero Trust Client contain a TOCTOU race condition vulnerability (CWE-367) due to the creation of an IPC socket in a world-writable /tmp directory that accepts unauthenticated control messages. This allows an unprivileged local user to exploit the HandleSaveLogs() function by creating and manipulating log files into symbolic links pointing to arbitrary root-owned files, making them world-writable. Additionally, the gimmelogs diagnostic tool running with root privileges is vulnerable to command injection via the dbstore on Linux/macOS, enabling a second privilege escalation path. On Windows, gimmelogs lacks command injection but can write ZIP archives to unintended locations. The vulnerability affects specific versions of Akamai Guardicore Platform Agent and Zero Trust Client. The vendor provides a patch and manages remediation for this cloud service.
Potential Impact
Successful exploitation allows an unprivileged local user to escalate privileges to root by making arbitrary root-owned files world-writable and by leveraging command injection in a root-privileged diagnostic tool. This can lead to full system compromise on affected Linux and macOS systems. The vulnerability is rated high severity with a CVSS score of 7.4. No known exploits are currently reported in the wild.
Mitigation Recommendations
A patch is available for this vulnerability. Since the affected products are cloud-hosted services, the vendor manages remediation server-side. Users should verify with Akamai's official advisory and ensure their Guardicore Platform Agent and Zero Trust Client are updated to patched versions beyond those affected (GPA 7.3.1 and ZTC 6.1.5). No additional mitigation steps are indicated by the vendor advisory.
CVE-2026-34354: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Akamai Guardicore Platform Agent
Description
Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Akamai Guardicore Platform Agent and Zero Trust Client contain a TOCTOU race condition vulnerability (CWE-367) due to the creation of an IPC socket in a world-writable /tmp directory that accepts unauthenticated control messages. This allows an unprivileged local user to exploit the HandleSaveLogs() function by creating and manipulating log files into symbolic links pointing to arbitrary root-owned files, making them world-writable. Additionally, the gimmelogs diagnostic tool running with root privileges is vulnerable to command injection via the dbstore on Linux/macOS, enabling a second privilege escalation path. On Windows, gimmelogs lacks command injection but can write ZIP archives to unintended locations. The vulnerability affects specific versions of Akamai Guardicore Platform Agent and Zero Trust Client. The vendor provides a patch and manages remediation for this cloud service.
Potential Impact
Successful exploitation allows an unprivileged local user to escalate privileges to root by making arbitrary root-owned files world-writable and by leveraging command injection in a root-privileged diagnostic tool. This can lead to full system compromise on affected Linux and macOS systems. The vulnerability is rated high severity with a CVSS score of 7.4. No known exploits are currently reported in the wild.
Mitigation Recommendations
A patch is available for this vulnerability. Since the affected products are cloud-hosted services, the vendor manages remediation server-side. Users should verify with Akamai's official advisory and ensure their Guardicore Platform Agent and Zero Trust Client are updated to patched versions beyond those affected (GPA 7.3.1 and ZTC 6.1.5). No additional mitigation steps are indicated by the vendor advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Is Cloud Service
- true
Threat ID: 69fe067ecbff5d8610f67287
Added to database: 5/8/2026, 3:51:26 PM
Last enriched: 5/8/2026, 4:07:52 PM
Last updated: 5/9/2026, 5:24:12 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.