Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine

March 18, 2026

A Webinar Guide to Auditing Modern Agentic Workflows

March 18, 2026

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

March 18, 2026
Facebook X (Twitter) Instagram
Thursday, March 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Ubuntu Flaw Enables Local Attackers to Gain Root Access
News

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

Team-CWDBy Team-CWDMarch 18, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified local privilege escalation (LPE) vulnerability has been discovered affecting default installations of Ubuntu Desktop 24.04 and later, allowing attackers to gain full root access.

The flaw, tracked as CVE-2026-3888, stems from the interaction between two core system components and was uncovered by the Qualys Threat Research Unit.

The issue arises from how snap-confine and systemd-tmpfiles operate together under certain conditions. While exploitation requires patience due to a built-in delay, the potential outcome is a complete system compromise.

A Timing-Based Attack Chain

The flaw relies on a timing-based attack chain. Specifically, attackers exploit automated system cleanup processes to replace critical directories with malicious content.

Key elements of the attack include:

  • Waiting for temporary file cleanup, which occurs after 10-30 days, depending on the system version

  • Recreating a deleted directory with malicious payloads

  • Triggering snap-confine to execute these files with root privileges

Although the vulnerability has a CVSS score of 7.8, indicating high severity, its complexity is also rated high due to the required timing window.

Still, no user interaction is needed, and only low-level access is required to begin the attack.

Affected Systems and Fixes

The vulnerability impacts multiple Ubuntu releases, particularly those using snapd package versions before recent updates. Systems running Ubuntu Desktop 24.04 and newer are most at risk.

Users and organizations are advised to upgrade immediately to patched versions:

  • Ubuntu 24.04 LTS: snapd 2.73+ubuntu24.04.2 or later

  • Ubuntu 25.10 LTS: snapd 2.73+ubuntu25.10.1 or later

  • Ubuntu 26.04 (development): snapd 2.74.1+ubuntu26.04.1 or later

  • Upstream snapd: version 2.75 or later

Legacy systems are not affected by default configurations but may still benefit from applying patches as a precaution.

Read more on Linux privilege escalation vulnerabilities: CrackArmor Flaws Expose Linux Systems to Privilege Escalation

During a separate review ahead of Ubuntu 25.10’s release, Qualys said they identified another flaw in the uutils coreutils package.

This issue involved a race condition in the rm utility that could allow attackers to manipulate file deletions during scheduled system tasks.

The vulnerability was addressed before public release. Developers reverted to GNU coreutils as a temporary safeguard, while upstream fixes have since been implemented.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Next Article A Webinar Guide to Auditing Modern Agentic Workflows
Team-CWD
  • Website

Related Posts

News

AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine

March 18, 2026
News

A Webinar Guide to Auditing Modern Agentic Workflows

March 18, 2026
News

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

March 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.