7.8
CWE
426
Advisory Published
Updated

CVE-2021-26557

First published: Thu Oct 07 2021(Updated: )

When Octopus Tentacle is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

Credit: security@octopus.com

Affected SoftwareAffected VersionHow to fix
Octopus Tentacle>=3.15.4<6.0.489

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-26557?

    CVE-2021-26557 is considered a high severity local privilege escalation vulnerability.

  • How do I fix CVE-2021-26557?

    To fix CVE-2021-26557, ensure correct ACLs are set on the installation folder of Octopus Tentacle.

  • Who is affected by CVE-2021-26557?

    CVE-2021-26557 affects users who installed Octopus Tentacle in a custom folder location without proper folder permissions.

  • What could an attacker exploit in CVE-2021-26557?

    An attacker could exploit CVE-2021-26557 to use DLL side-loading to gain elevated privileges on the system.

  • What versions of Octopus Tentacle are vulnerable to CVE-2021-26557?

    Octopus Tentacle versions between 3.15.4 and 6.0.489 are vulnerable to CVE-2021-26557.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203