Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.

The mentality is, "If an attacker already has interactive access to one of my machines, it

The link for this article located at SC Magazine is no longer available.