Privilege escalation describes a circumstance wherever an attacker with some level of restricted obtain will be able to, devoid of authorization, elevate their privileges or access amount.[32] By way of example, an ordinary Computer system person could possibly exploit a vulnerability while in the procedure to get usage of restricted facts; or even