ACL Analytics RCE: Critical Arbitrary Code Execution via EXECUTE Function

ACL Analytics RCE: Critical Arbitrary Code Execution via EXECUTE Function

The National Vulnerability Database reports a critical arbitrary code execution vulnerability, CVE-2018-25320, affecting ACL Analytics versions 11.x through 13.0.0.579. This flaw allows attackers to execute arbitrary commands by leveraging the application’s EXECUTE function.

Attackers can exploit this vulnerability to download and run malicious PowerShell scripts with system privileges. This opens the door for establishing reverse shells and achieving complete system control, posing a severe risk to affected environments. The National Vulnerability Database assigns this a CVSSv3 score of 9.8 (Critical), underscoring the severity of unauthenticated remote code execution.

Defenders must recognize that this isn’t just a theoretical risk; it’s a direct path to full system compromise. The attacker’s calculus here is simple: gain initial access, then use the EXECUTE function to elevate privileges and establish persistence. This vulnerability, classified as CWE-94 (Improper Control of Generation of Code (‘Code Injection’)), highlights a fundamental design flaw that allows untrusted input to be executed as code.

What This Means For You

  • If your organization utilizes ACL Analytics, specifically versions 11.x through 13.0.0.579, you are exposed to critical arbitrary code execution. Immediately verify your version and apply patches or updates to mitigate CVE-2018-25320. Audit systems running ACL Analytics for any signs of compromise, especially unexpected PowerShell activity or new network connections.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2018-25320 - ACL Analytics EXECUTE Function RCE via bitsadmin

Sigma YAML — free preview
title: CVE-2018-25320 - ACL Analytics EXECUTE Function RCE via bitsadmin
id: scw-2026-05-17-ai-1
status: experimental
level: critical
description: |
  Detects the use of the EXECUTE function within ACL Analytics (aclanalytics.exe) to initiate a command line that leverages bitsadmin to download and execute PowerShell scripts (.ps1). This is a direct indicator of the CVE-2018-25320 exploit attempting to achieve arbitrary code execution.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2018-25320/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: process_creation
detection:
  selection:
      Image|endswith:
          - 'aclanalytics.exe'
      ParentImage|endswith:
          - 'aclanalytics.exe'
      CommandLine|contains:
          - 'EXECUTE'
      CommandLine|contains:
          - 'bitsadmin'
  selection_bitsadmin:
      CommandLine|contains:
          - '/transfer'
      CommandLine|contains:
          - '/download'
      CommandLine|contains:
          - '.ps1'
  condition: selection AND selection_bitsadmin
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2018-25320 RCE ACL Analytics versions 11.x through 13.0.0.579
CVE-2018-25320 RCE Vulnerable function: EXECUTE
CVE-2018-25320 RCE Attack vector: bitsadmin to download and execute PowerShell scripts
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 17, 2026 at 16:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma