Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The Hacker News by The Hacker News
May 3, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMay 03, 2026Vulnerability / Container Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The nine-year-old flaw is also tracked as Copy Fail by Theori and Xint. Fixes have been made available in Linux kernel versions 6.18.22, 6.19.12, and 7.0.

“Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation,” CISA said in an advisory.

In a write-up published earlier this week, the researchers said Copy Fail is the result of a logic bug in the Linux kernel’s authentication cryptographic template that allows an attacker to reliably trigger privilege escalation trivially by means of a 732-byte Python-based exploit. It was introduced through three separate, individually harmless changes to the Linux kernel made in 2011, 2015, and 2017.

The high-severity security vulnerability impacts Linux distributions shipped since 2017, and permits an unprivileged local user to obtain root-level access by corrupting the kernel’s in-memory page cache of any readable file, including setuid binaries. This corruption could be carried out by unprivileged users and could result in code execution with root permissions.

“Because the page cache represents the in-memory version of executables, modifying it effectively alters binaries at execution time without touching disk,” Google-owned Wiz said. “This enables attackers to inject code into privileged binaries (e.g., /usr/bin/su) and thereby gain root privileges.”

The prevalence of Linux in cloud environments means the vulnerability has a significant impact. Kaspersky, in its analysis of the flaw, said Copy Fail poses a serious risk to containerized environments, as Docker, LXC, and Kubernetes “grant processes inside a container access to the AF_ALG subsystem if the algif_aead module is loaded into the host kernel” by default.

“Copy Fail poses a risk of breaching container isolation and gaining control over the physical machine,” the Russian security vendor said. “At the same time, exploitation does not require the use of complex techniques, such as race conditions or memory address guessing, which lowers the entry barrier for a potential attacker.”

“Detecting the attack is difficult because the exploit uses only legitimate system calls, which are hard to distinguish from normal application behavior.”

Adding to the urgency is the availability of a fully working exploit proof-of-concept (PoC), with Kaspersky stating Go and Rust versions of the original Python implementation have already been detected in open-source repositories. 

CISA did not share any details about how the vulnerability is being exploited in the wild. However, the Microsoft Defender Security Research Team said it’s “seeing preliminary testing activity that might result most likely in increased threat actor exploitation over the next few days.”

“The attack vector is local (AV:L) and requires low privileges with no user interaction, meaning any unprivileged user on a vulnerable system can attempt exploitation,” it added. “Critically, this vulnerability is not remotely exploitable in isolation, but becomes highly impactful when chained with an initial access vector such as Secure Shell (SSH) access, malicious CI job execution, or container footholds.”

The tech giant has also detailed one possible route attackers could take to exploit the vulnerability –

  • Conduct reconnaissance to identify a Linux host or container running a kernel version susceptible to Copy Fail.
  • Prepare a small Python trigger for use against the endpoint.
  • Execute the exploit from a low-privilege context, either as a regular Linux user on a host or a compromised container process with no special capabilities.
  • Exploit performs a controlled 4‑byte overwrite in the kernel page cache, leading to corruption of sensitive kernel‑managed data.
  • Attacker escalates their process to UID 0 and obtain full root privileges.

Federal Civilian Executive Branch (FCEB) agencies have been advised to apply the fixes by May 15, 2026, as updates have been pushed by impacted Linux distributions. If patching is not an immediate option, organizations are recommended to disable the affected feature, implement network isolation, and apply access controls. 



Source link

The Hacker News

The Hacker News

Next Post
Chinese stocks are about to get a big AI boost, Morgan Stanley predicts

Chinese stocks are about to get a big AI boost, Morgan Stanley predicts

Recommended.

Graybar Names Jonathan Rayment District Vice President in Seattle

Graybar Names Jonathan Rayment District Vice President in Seattle

July 16, 2025
Huawei, IEEE a Industry Pioneers vydávají Bílou knihu o pokročilé technologii Wi-Fi 7 pro Evropu

Huawei, IEEE a Industry Pioneers vydávají Bílou knihu o pokročilé technologii Wi-Fi 7 pro Evropu

October 3, 2025

Trending.

Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With 0,000+ Prize Pool

Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With $280,000+ Prize Pool

April 2, 2026
Intel Gives Bullish CPU Outlook With .2B Ireland Fab Deal

Intel Gives Bullish CPU Outlook With $14.2B Ireland Fab Deal

April 1, 2026
Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

April 1, 2026
UK regulators to probe Microsoft amid AI adoption surge

UK regulators to probe Microsoft amid AI adoption surge

March 31, 2026
EPG Adds Over US0 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

EPG Adds Over US$100 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

March 31, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio