A user with a compromised configuration can start an unsigned binary as a service.CreditsSkyler Knecht and William Martin from the Adversarial Security Practice at Navy Federal Credit UnionReferenceshttps://support.pega.com/support-doc/pega-security-advisory-b23-robotics-and-workforce-intelligence-local-privilege