What is Privilege Escalation?
Privilege escalation is an attack technique where an adversary exploits a vulnerability, misconfiguration, or stolen credential to gain higher-level permissions than originally authorized — typically moving from a regular user to an administrator or root account.
Also known as: privilege escalation attack, vertical privilege escalation
Privilege escalation comes in two forms. Vertical escalation involves gaining higher privileges than currently assigned — for example, a standard user obtaining administrator access. Horizontal escalation involves accessing resources of another user at the same privilege level — such as one customer viewing another customer's data. Both are critical steps in most sophisticated attack chains.
Common privilege escalation vectors include exploiting unpatched software vulnerabilities, misconfigured permissions, insecure service accounts, credential reuse, and overly permissive access controls. In cloud environments, misconfigured IAM roles and overly broad policies are frequent culprits. Attackers often chain multiple low-severity issues together: a low-privilege foothold plus a local privilege escalation vulnerability can equal full system compromise.
Defense centers on the principle of least privilege: every user, process, and service should have only the minimum permissions necessary to function. Regular access reviews, strong credential management, prompt patching, and monitoring for anomalous privilege usage all reduce the attack surface. Critically, secrets like admin credentials, API keys, and SSH keys must be tightly controlled — if these are found in emails or shared documents, they become the fastest path to privilege escalation.
How Vaulted uses Privilege Escalation
Vaulted supports least-privilege practices by ensuring that shared credentials — often the keys to privilege escalation — do not persist in communication channels. When a team needs to share an admin password, database credential, or AWS access key, Vaulted's self-destructing links ensure the secret is available only for a limited number of views before being permanently deleted. This prevents attackers who gain access to a mailbox or chat history from finding the credentials they need to escalate privileges.