The Akamai Guardicore Platform Agent is a lightweight software component installed on servers and endpoints that enables microsegmentation, network visibility, and security policy enforcement as part of the Akamai Guardicore Segmentation platform.

During the security hardening assessment of a client’s Windows server, I identified a privilege escalation vulnerability in the product. This flaw enables local attackers to elevate their privileges to SYSTEM level.

The Akamai information security team was informed about this vulnerability, and collaboration ensured its responsible disclosure. A patch has been released for all supported versions as of 31.08.2025, and Akamai customers are strongly encouraged to update their systems promptly. Further information can be obtained here.

The vulnerability has been assigned CVE-2025-53841 and has a severity of 7.8 (high) (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

To provide Akamai’s customers with sufficient time to patch their systems, I will refrain from disclosing technical details about the vulnerability at this time.

Disclosure Timeline

24.06.2025 Initial notification per email
27.06.2025 Technical details shared with Akamai
01.07.2025 Akamai confirms the vulnerability
31.08.2025 Akamai rolls out a fix for all supported versions
08.09.2025 This (limited) public disclosure

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.