Privilege escalation happens when a malicious user exploits a bug, design flaw or configuration error in an application or operating system to gain elevated access to resources that should normally be unavailable to that user. Privilege escalation attacks exploit weaknesses and security vulnerabilities with the goal of elevating access to…