Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

Published:

spot_img

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

The Qualys Threat Research Unit has uncovered a significant Local Privilege Escalation (LPE) vulnerability affecting default installations of Ubuntu Desktop version 24.04 and later. Identified as CVE-2026-3888, this flaw permits an unprivileged local attacker to gain full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles.

This vulnerability poses a serious threat, as the exploit requires a specific time-based window of 10 to 30 days, leading to a complete compromise of the host system.

Understanding the Vulnerability

The root of this vulnerability lies in the unintended interaction between two privileged utilities:

  • snap-confine: This utility manages execution environments for snap applications, which are self-contained application bundles that include their own dependencies.

  • systemd-tmpfiles: This component automatically cleans up temporary files and directories that exceed a defined age.

During the review process for Ubuntu 25.10, a separate vulnerability in the uutils coreutils package was also identified and mitigated through proactive collaboration with the Ubuntu Security Team.

The Attack Surface for CVE-2026-3888

The background service known as snapd manages the entire Snap ecosystem on Ubuntu, overseeing the discovery, installation, updates, and removal of snap packages. Canonical designed this framework to resolve dependency conflicts and provide a unified packaging target across various Ubuntu versions. Snapd also enforces a permission model that dictates what each snap can access on the host system.

Understanding snapd is crucial, as both snap-confine and systemd-tmpfiles operate within this framework. Snap-confine builds the sandbox defined by snapd, while systemd-tmpfiles manages the volatile filesystem that both snaps and system services rely on.

Snap-confine

Snap-confine is a setuid root binary that establishes the sandbox before a snap application runs. It manages mount namespace isolation, cgroup enforcement, AppArmor policy loading, and seccomp filtering. Because it operates with elevated privileges, it represents a critical trust boundary. A flaw like CVE-2026-3888 in this component could lead to privilege escalation, making consistent patching of snapd a priority.

Systemd-tmpfiles

Systemd-tmpfiles oversees the lifecycle of volatile directories such as /tmp, /run, and /var/tmp. It creates these directories with the appropriate ownership at boot and cleans out stale files on a schedule. Misconfigured tmpfiles rules can create local escalation paths, opening the door to symlink races and local escalation.

Exploitation Mechanism

CVE-2026-3888 is rated as high severity, with a CVSS v3.1 score of 7.8 out of 10. The vector string (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) indicates a local attack vector with high complexity, requiring low privileges and no user interaction. The scope is altered, meaning a successful exploit can impact resources beyond the vulnerable component, affecting confidentiality, integrity, and availability.

The inherent time-delay mechanism in the exploit chain contributes to the high attack complexity. In default configurations, systemd-tmpfiles is scheduled to remove stale data in /tmp. An attacker can exploit this by manipulating the timing of cleanup cycles. The attack vector involves the following steps:

  1. The attacker waits for the system’s cleanup daemon (30 days in Ubuntu 24.04; 10 days in later versions) to delete a critical directory (/tmp/.snap) required by snap-confine.
  2. Once deleted, the attacker recreates the directory with malicious payloads.
  3. During the next sandbox initialization, snap-confine bind-mounts these files as root, allowing the execution of arbitrary code within a privileged context.

Vulnerable Versions

The following snapd package versions are vulnerable, and organizations are urged to upgrade immediately:

  • Ubuntu 24.04 LTS: snapd versions prior to 2.73+ubuntu24.04.1
  • Ubuntu 25.10 LTS: snapd versions prior to 2.73+ubuntu25.10.1
  • Ubuntu 26.04 LTS (Dev): snapd versions prior to 2.74.1+ubuntu26.04.1
  • Upstream snapd: versions prior to 2.75

For legacy systems (16.04–22.04 LTS), while not vulnerable in default configurations, it is advisable to apply the patch to mitigate risks associated with non-default configurations that may mimic newer releases.

Technical Details

For further technical details regarding these vulnerabilities, refer to the advisory available at Qualys.

Secondary Finding: Vulnerability in Ubuntu 25.10 uutils Coreutils

In a proactive security effort prior to the release of Ubuntu Desktop 25.10, the Qualys Threat Research Unit assisted the Ubuntu Security Team in reviewing the uutils coreutils package, a Rust rewrite of standard GNU utilities. A race condition in the rm utility allowed an unprivileged local attacker to replace directory entries with symlinks during root-owned cron executions. Successful exploitation could lead to arbitrary file deletion as root or further privilege escalation by targeting snap sandbox directories.

This vulnerability was reported and mitigated before the public release of Ubuntu 25.10. The default rm command was reverted to GNU coreutils to address this risk immediately, and upstream fixes have since been applied to the uutils repository.

Qualys QID Coverage for Detecting CVE-2026-3888

Qualys is releasing QIDs as they become available. The following table outlines the current coverage:

QID Title VulnSigs Version
386810 Ubuntu Snapd Local Privilege Escalation (LPE) Vulnerability To be released by 3pm PT

For a complete list of coverage for this vulnerability, please consult the Qualys Vulnerability Knowledgebase.

Discover Vulnerable Assets with Qualys CyberSecurity Asset Management

Identifying all assets susceptible to this vulnerability is the first crucial step in managing and mitigating associated risks. Organizations can utilize CyberSecurity Asset Management 3.0 with External Attack Surface Management to identify internet-facing instances and container/Kubernetes nodes running vulnerable versions of the snap vulnerability.

For example, to identify all assets running Ubuntu, the following query can be used:

operatingSystem.name: [“Ubuntu”]

Enhancing Security Posture with Qualys VMDR

Qualys VMDR offers comprehensive coverage and visibility into vulnerabilities, enabling organizations to respond rapidly and prioritize risks. Customers can also leverage Qualys Patch Management to effectively remediate these vulnerabilities.

Utilizing the power of Qualys VMDR alongside TruRisk and the Qualys Query Language (QQL) allows for efficient identification and prioritization of vulnerable assets. The following QQL statement can be employed:

vulnerabilities.vulnerability.qid: 386810

Automatically Patch CVE-2026-3888 with Qualys Patch Management

Patches for this vulnerability are now available. Qualys Patch Management can automatically deploy these patches to vulnerable assets as they become available. Customers can use the “patch now” button to add this vulnerability to a patch job. Once patches are released, Qualys will find the relevant patches and automatically add them to the patch job, facilitating deployment from the Qualys platform.

Follow the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors Since the onset of the Iran war, cyber activity associated with the conflict has...

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations Cohesity has unveiled a series of significant enhancements to its data...

Ajman NuVentures Centre Free Zone Strengthens Legal Framework with MoU Signing with DIFC Courts

Ajman NuVentures Centre Free Zone Strengthens Legal Framework with MoU Signing with DIFC Courts Ajman NuVentures Centre Free Zone (ANCFZ) has taken a significant step...

Wio Bank PJSC Achieves AED 1.24 Billion Revenue and AED 61 Billion Assets in FY2025

Wio Bank PJSC Achieves AED 1.24 Billion Revenue and AED 61 Billion Assets in FY2025 Wio Bank PJSC has reported a significant financial performance for...