CVE-2026-35099: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Lakeside Software SysTrack Agent
Lakeside SysTrack Agent 11 before 11.5.0.15 has a race condition with resultant local privilege escalation to SYSTEM. The fixed versions are 11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15.
AI Analysis
Technical Summary
CVE-2026-35099 is a race condition vulnerability categorized under CWE-362 found in the Lakeside Software SysTrack Agent prior to version 11.5.0.15. The vulnerability arises from improper synchronization during concurrent execution of shared resources within the agent, allowing a local attacker to escalate privileges to SYSTEM level. The SysTrack Agent is a widely used endpoint monitoring and analytics tool deployed in enterprise environments for IT operations and user experience management. The race condition can be exploited by an attacker with local access to the system, who can trigger concurrent operations that interfere with each other, leading to a state where privilege escalation is possible. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for complete system compromise (confidentiality, integrity, and availability impacts are all high). The attack complexity is high, requiring specific conditions and timing, and no user interaction is needed. The vulnerability does not require prior privileges, making it more dangerous if local access is obtained. Fixed versions have been released across multiple branches (11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15), but no public exploit code or active exploitation has been reported yet. This vulnerability highlights the risks of concurrency issues in endpoint agents that run with elevated privileges.
Potential Impact
If exploited, this vulnerability allows a local attacker to gain SYSTEM-level privileges on affected endpoints, effectively compromising the entire system. This can lead to unauthorized access to sensitive data, manipulation or deletion of critical files, installation of persistent malware, and disruption of endpoint monitoring capabilities. Given the agent’s role in enterprise IT environments, successful exploitation could undermine security monitoring and incident response efforts, potentially allowing attackers to operate undetected. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Organizations relying on SysTrack Agent for endpoint analytics and monitoring face increased risk of insider threats or lateral movement by attackers who gain local access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where local access controls are weak or compromised.
Mitigation Recommendations
Organizations should immediately verify the version of SysTrack Agent deployed and upgrade to the fixed versions (11.2.1.28, 11.3.0.38, 11.4.0.24, or 11.5.0.15) as appropriate. In addition to patching, implement strict local access controls to limit who can log into endpoints, including enforcing least privilege principles and using multi-factor authentication for local accounts. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of privilege escalation attempts. Conduct regular audits of installed software versions and configuration management to ensure timely application of security updates. Where patching is delayed, consider temporarily disabling or restricting the SysTrack Agent service if feasible, or isolating affected systems to reduce exposure. Educate IT staff about the risks of race conditions and encourage secure coding and testing practices for concurrency issues in internal software development. Finally, maintain robust incident response plans to quickly detect and respond to potential exploitation attempts.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Netherlands, Sweden, Switzerland
CVE-2026-35099: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Lakeside Software SysTrack Agent
Description
Lakeside SysTrack Agent 11 before 11.5.0.15 has a race condition with resultant local privilege escalation to SYSTEM. The fixed versions are 11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-35099 is a race condition vulnerability categorized under CWE-362 found in the Lakeside Software SysTrack Agent prior to version 11.5.0.15. The vulnerability arises from improper synchronization during concurrent execution of shared resources within the agent, allowing a local attacker to escalate privileges to SYSTEM level. The SysTrack Agent is a widely used endpoint monitoring and analytics tool deployed in enterprise environments for IT operations and user experience management. The race condition can be exploited by an attacker with local access to the system, who can trigger concurrent operations that interfere with each other, leading to a state where privilege escalation is possible. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for complete system compromise (confidentiality, integrity, and availability impacts are all high). The attack complexity is high, requiring specific conditions and timing, and no user interaction is needed. The vulnerability does not require prior privileges, making it more dangerous if local access is obtained. Fixed versions have been released across multiple branches (11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15), but no public exploit code or active exploitation has been reported yet. This vulnerability highlights the risks of concurrency issues in endpoint agents that run with elevated privileges.
Potential Impact
If exploited, this vulnerability allows a local attacker to gain SYSTEM-level privileges on affected endpoints, effectively compromising the entire system. This can lead to unauthorized access to sensitive data, manipulation or deletion of critical files, installation of persistent malware, and disruption of endpoint monitoring capabilities. Given the agent’s role in enterprise IT environments, successful exploitation could undermine security monitoring and incident response efforts, potentially allowing attackers to operate undetected. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Organizations relying on SysTrack Agent for endpoint analytics and monitoring face increased risk of insider threats or lateral movement by attackers who gain local access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where local access controls are weak or compromised.
Mitigation Recommendations
Organizations should immediately verify the version of SysTrack Agent deployed and upgrade to the fixed versions (11.2.1.28, 11.3.0.38, 11.4.0.24, or 11.5.0.15) as appropriate. In addition to patching, implement strict local access controls to limit who can log into endpoints, including enforcing least privilege principles and using multi-factor authentication for local accounts. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of privilege escalation attempts. Conduct regular audits of installed software versions and configuration management to ensure timely application of security updates. Where patching is delayed, consider temporarily disabling or restricting the SysTrack Agent service if feasible, or isolating affected systems to reduce exposure. Educate IT staff about the risks of race conditions and encourage secure coding and testing practices for concurrency issues in internal software development. Finally, maintain robust incident response plans to quickly detect and respond to potential exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-04-01T15:39:51.020Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd69c0e6bfc5ba1deb926c
Added to database: 4/1/2026, 6:53:52 PM
Last enriched: 4/1/2026, 7:08:26 PM
Last updated: 4/6/2026, 8:22:20 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.