The alarms trip without warning. An account you thought harmless now owns root access. This is Discovery Privilege Escalation in its raw form—when the system reveals paths you didn’t believe existed, and attackers climb them faster than your alerts can fire.
Discovery privilege escalation happens when a user or process uncovers hidden permissions, misconfigurations, or exposed APIs that lead to higher-level access. Unlike direct privilege escalation, the discovery phase isn’t brute force—it’s reconnaissance. The attacker maps every corner of the environment, probing file metadata, network shares, role assignments, and environment variables. Once the knowledge is in hand, the escalation is inevitable.
Common vectors include forgotten default accounts, excessive role permissions in IAM policies, stale SSH keys, orphaned cloud resources, and misconfigured container runtimes. Detection depends on monitoring for permission enumeration, unexpected group membership queries, or API calls against endpoints that should be unreachable.