Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35099: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Lakeside Software SysTrack Agent

0
High
VulnerabilityCVE-2026-35099cvecve-2026-35099cwe-362
Published: Wed Apr 01 2026 (04/01/2026, 15:39:51 UTC)
Source: CVE Database V5
Vendor/Project: Lakeside Software
Product: SysTrack Agent

Description

Lakeside SysTrack Agent 11 before 11.5.0.15 has a race condition with resultant local privilege escalation to SYSTEM. The fixed versions are 11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 19:08:26 UTC

Technical Analysis

CVE-2026-35099 is a race condition vulnerability categorized under CWE-362 found in the Lakeside Software SysTrack Agent prior to version 11.5.0.15. The vulnerability arises from improper synchronization during concurrent execution of shared resources within the agent, allowing a local attacker to escalate privileges to SYSTEM level. The SysTrack Agent is a widely used endpoint monitoring and analytics tool deployed in enterprise environments for IT operations and user experience management. The race condition can be exploited by an attacker with local access to the system, who can trigger concurrent operations that interfere with each other, leading to a state where privilege escalation is possible. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for complete system compromise (confidentiality, integrity, and availability impacts are all high). The attack complexity is high, requiring specific conditions and timing, and no user interaction is needed. The vulnerability does not require prior privileges, making it more dangerous if local access is obtained. Fixed versions have been released across multiple branches (11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15), but no public exploit code or active exploitation has been reported yet. This vulnerability highlights the risks of concurrency issues in endpoint agents that run with elevated privileges.

Potential Impact

If exploited, this vulnerability allows a local attacker to gain SYSTEM-level privileges on affected endpoints, effectively compromising the entire system. This can lead to unauthorized access to sensitive data, manipulation or deletion of critical files, installation of persistent malware, and disruption of endpoint monitoring capabilities. Given the agent’s role in enterprise IT environments, successful exploitation could undermine security monitoring and incident response efforts, potentially allowing attackers to operate undetected. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Organizations relying on SysTrack Agent for endpoint analytics and monitoring face increased risk of insider threats or lateral movement by attackers who gain local access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where local access controls are weak or compromised.

Mitigation Recommendations

Organizations should immediately verify the version of SysTrack Agent deployed and upgrade to the fixed versions (11.2.1.28, 11.3.0.38, 11.4.0.24, or 11.5.0.15) as appropriate. In addition to patching, implement strict local access controls to limit who can log into endpoints, including enforcing least privilege principles and using multi-factor authentication for local accounts. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of privilege escalation attempts. Conduct regular audits of installed software versions and configuration management to ensure timely application of security updates. Where patching is delayed, consider temporarily disabling or restricting the SysTrack Agent service if feasible, or isolating affected systems to reduce exposure. Educate IT staff about the risks of race conditions and encourage secure coding and testing practices for concurrency issues in internal software development. Finally, maintain robust incident response plans to quickly detect and respond to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-04-01T15:39:51.020Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd69c0e6bfc5ba1deb926c

Added to database: 4/1/2026, 6:53:52 PM

Last enriched: 4/1/2026, 7:08:26 PM

Last updated: 4/6/2026, 8:22:20 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses