CVE-2026-2123 Overview
A privilege escalation vulnerability has been identified in Micro Focus Operations Agent (<=OA 12.29) on Windows systems. Under specific conditions, the Operations Agent may execute files from writable locations, allowing a local attacker with limited privileges to escalate their access on the affected system. This vulnerability was discovered through a security audit and responsibly disclosed by Manuel Rickli and Philippe Leiser of Oneconsult AG.
Critical Impact
Local attackers with low privileges can exploit writable directory paths used by Operations Agent to execute arbitrary code with elevated privileges, potentially compromising the entire Windows system.
Affected Products
- Micro Focus Operations Agent version 12.29 and earlier
- Operations Agent installations on Windows platforms
- Enterprise monitoring environments utilizing Operations Agent
Discovery Timeline
- 2026-03-31 - CVE-2026-2123 published to NVD
- 2026-04-01 - Last updated in NVD database
Technical Details for CVE-2026-2123
Vulnerability Analysis
This vulnerability (CWE-280: Improper Handling of Insufficient Permissions or Privileges) stems from the Operations Agent's handling of executable paths on Windows systems. The agent, which typically runs with elevated privileges to perform system monitoring tasks, may inadvertently execute binaries from directories where standard users have write permissions.
When the Operations Agent processes certain operations, it searches for or invokes executables from paths that may be writable by low-privileged users. An attacker can place a malicious executable in such a location, which the agent then executes with its elevated privileges, resulting in privilege escalation.
Root Cause
The root cause is classified under CWE-280 (Improper Handling of Insufficient Permissions or Privileges). The Operations Agent fails to properly validate the permissions and integrity of directories from which it loads or executes files. This improper permission handling allows unprivileged users to plant malicious executables in locations trusted by the agent service.
The vulnerability arises because:
- The agent searches for executables in directories with overly permissive access controls
- Insufficient validation of file sources before execution
- The service runs with elevated privileges, amplifying the impact of any code execution
Attack Vector
The attack is conducted locally (AV:L), requiring the attacker to have prior access to the target Windows system with at least low-level privileges. The attack complexity is low, and user interaction is required for successful exploitation. An attacker would:
- Identify writable directories used by the Operations Agent for executable lookups
- Place a malicious executable (such as a crafted DLL or EXE) in the target directory
- Wait for or trigger the agent to execute the planted file
- Gain elevated privileges when the agent runs the malicious code
Due to the local attack vector, this vulnerability is typically exploited in post-compromise scenarios where an attacker already has initial access to the system.
Detection Methods for CVE-2026-2123
Indicators of Compromise
- Unexpected executable files appearing in Operations Agent installation directories or associated writable paths
- Process creation events showing unusual child processes spawned by the Operations Agent service
- File modification timestamps indicating recent changes to directories used by the agent
- Suspicious DLL or EXE files in C:\ProgramData or other common writable locations associated with the agent
Detection Strategies
- Monitor file system changes in directories utilized by Operations Agent using file integrity monitoring (FIM) solutions
- Implement behavioral detection rules for unusual process trees originating from the Operations Agent service account
- Review Windows Security Event logs for process creation events (Event ID 4688) associated with the agent
- Deploy endpoint detection and response (EDR) solutions to identify privilege escalation patterns
Monitoring Recommendations
- Enable enhanced auditing for object access on directories used by Operations Agent
- Configure SentinelOne to monitor for suspicious process behaviors and DLL loading patterns
- Establish baseline process behavior for the Operations Agent service and alert on deviations
- Implement real-time alerting for file writes to sensitive directories by non-administrative users
How to Mitigate CVE-2026-2123
Immediate Actions Required
- Upgrade Operations Agent to a patched version as specified in the vendor advisory
- Audit and restrict write permissions on directories used by the Operations Agent service
- Review and harden file system permissions on Operations Agent installation paths
- Monitor systems for any indicators of compromise while awaiting patch deployment
Patch Information
Micro Focus has addressed this vulnerability in versions newer than OA 12.29. Administrators should consult the Micro Focus Knowledge Base Article for specific patching instructions and the latest secure version information. It is recommended to apply the security update as soon as possible to all affected Windows systems running Operations Agent.
Workarounds
- Restrict write access to all directories in the Operations Agent search path to administrators only
- Implement application whitelisting to prevent unauthorized executables from running in agent directories
- Use Windows Defender Application Control (WDAC) or AppLocker policies to restrict executable sources
- Consider running the Operations Agent with reduced privileges where operationally feasible
# Configuration example - Restrict directory permissions
# Run as Administrator in PowerShell
icacls "C:\Program Files\HP\Operations Agent" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


