3.13 privilege escalation vulnerability