Exploitation of a bug, oversight, or misconfiguration to gain access to information from which one would normally be excluded. A privilege escalation attack elevates the attacker's level of access to and frequently control over, the compromised system.