Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-5373

Summary
Assigner-runZero
Assigner Org ID-44488dab-36db-4358-99f9-bc116477f914
Published At-07 Apr, 2026 | 14:10
Updated At-07 Apr, 2026 | 14:50
Rejected At-
Credits

runZero Platform superuser privilege escalation

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:runZero
Assigner Org ID:44488dab-36db-4358-99f9-bc116477f914
Published At:07 Apr, 2026 | 14:10
Updated At:07 Apr, 2026 | 14:50
Rejected At:
▼CVE Numbering Authority (CNA)
runZero Platform superuser privilege escalation

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform.

Affected Products
Vendor
runZero
Product
Platform
Default Status
unaffected
Versions
Affected
  • From 0 before 4.0.260202.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-269CWE-269 Improper Privilege Management
Type: CWE
CWE ID: CWE-269
Description: CWE-269 Improper Privilege Management
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

This issue was fixed in version 4.0.260202.0 of the runZero Platform

Configurations

Workarounds

Exploits

Credits

finder
runZero
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://help.runzero.com/docs/release-notes/#402602020
release-notes
https://www.runzero.com/advisories/runzero-platform-su-privesc-cve-2026-5373/
vendor-advisory
Hyperlink: https://help.runzero.com/docs/release-notes/#402602020
Resource:
release-notes
Hyperlink: https://www.runzero.com/advisories/runzero-platform-su-privesc-cve-2026-5373/
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:44488dab-36db-4358-99f9-bc116477f914
Published At:07 Apr, 2026 | 15:17
Updated At:21 Apr, 2026 | 15:09

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Primary3.18.4HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CPE Matches

runzero
runzero
>>runzero_platform>>Versions before 4.0.260202.0(exclusive)
cpe:2.3:a:runzero:runzero_platform:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Secondary44488dab-36db-4358-99f9-bc116477f914
CWE ID: CWE-269
Type: Secondary
Source: 44488dab-36db-4358-99f9-bc116477f914
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://help.runzero.com/docs/release-notes/#40260202044488dab-36db-4358-99f9-bc116477f914
Release Notes
https://www.runzero.com/advisories/runzero-platform-su-privesc-cve-2026-5373/44488dab-36db-4358-99f9-bc116477f914
Vendor Advisory
Hyperlink: https://help.runzero.com/docs/release-notes/#402602020
Source: 44488dab-36db-4358-99f9-bc116477f914
Resource:
Release Notes
Hyperlink: https://www.runzero.com/advisories/runzero-platform-su-privesc-cve-2026-5373/
Source: 44488dab-36db-4358-99f9-bc116477f914
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2026-7778
Matching Score-6
Assigner-44488dab-36db-4358-99f9-bc116477f914
ShareView Details
Matching Score-6
Assigner-44488dab-36db-4358-99f9-bc116477f914
CVSS Score-5||MEDIUM
EPSS-0.03% / 8.12%
||
7 Day CHG~0.00%
Published-05 May, 2026 | 13:44
Updated-07 May, 2026 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
runZero Platform dashboard configuration exposure

An issue that could allow a dashboard configuration to be viewed from outside of the authorized organization scope has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N (5.0, Medium). This issue was fixed in version v4.0.260416.0 of the runZero Platform.

Action-Not Available
Vendor-runZero
Product-Platform
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-16875
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-86.82% / 99.43%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 17:08
Updated-23 Feb, 2026 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Exchange Server Remote Code Execution Vulnerability

<p>A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.</p> <p>An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.</p>

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server 2019 Cumulative Update 5Microsoft Exchange Server 2019 Cumulative Update 6Microsoft Exchange Server 2016 Cumulative Update 16Microsoft Exchange Server 2016 Cumulative Update 17
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Details not found