
IGEL Technology has issued a critical security advisory for its Linux-based operating system, IGEL OS, warning users of a serious privilege escalation vulnerability that could allow attackers to gain root-level access on affected systems.
“A vulnerability of the privilege escalation type has been found in the IGEL OS network configuration mechanism. It could enable a non-privileged user to execute commands as root,” the security advisory explains.
The advisory, labeled ISN 2025-14, affects IGEL OS 11 and IGEL OS 12, which are widely deployed in enterprise environments for accessing cloud workspaces, virtual desktops, and remote applications. The vendor promotes IGEL OS as a “next-gen edge OS”—making this vulnerability particularly impactful for organizations relying on secure and lightweight endpoint management.
The flaw exists in the network configuration mechanism of IGEL OS. If successfully exploited, a local attacker with limited user privileges could escalate access to root, potentially modifying system configurations, installing malware, or extracting sensitive information.
The vulnerability has been rated Critical, underscoring the high risk it poses to enterprise environments where endpoint security is vital.
IGEL has released guidance for patching the affected versions:
- For IGEL OS 12, update to version 12.7.0 (when available).
- For IGEL OS 11, update to version 11.10.290.
Until these updates are applied, systems remain vulnerable to privilege escalation attacks.
Organizations using IGEL OS should immediately inventory affected systems, prioritize the deployment of the latest patches, and review privilege policies for users on their endpoint devices.