A security auditor finds that certain accounts, intended to have standard user permissions, are executing commands that typically require admin rights. Further investigation reveals these accounts have been added to a group with elevated privileges. Which situation does this observation most accurately reflect?
Data exposure from compromised encryption protocols
Privilege escalation due to unauthorized changes in group memberships
Service disruption caused by frequent account lockouts
Unauthorized access from unchanged default account passwords