24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
5.01%

Description

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

Statistics

  • 24 Posts
  • 6 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

New Ivanti EPMM Zero-Day CVE-2026-6973 Actively Exploited — Patch Immediately
#CyberSecurity
securebulletin.com/new-ivanti-

  • 4
  • 0
  • 0
  • 6h ago
Profile picture fallback

🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.

CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.

Read: thehackernews.com/2026/05/ivan

  • 0
  • 1
  • 0
  • 8h ago
Profile picture fallback

The U.S. CISA has added a zero-day vulnerability (CVE-2026-6973) in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch by May 10, 2026. This flaw, requiring admin privileges, allows for arbitrary code execution and is already being exploited.
securityaffairs.com/191822/sec

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

CISA KEV update May 7: CVE-2026-6973 Ivanti EPMM added. Actively exploited input validation flaw. Federal deadline applies, everyone else should patch. - cisa.gov/news-events/alerts/20

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 3h ago

Bluesky

Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) www.helpnetsecurity.com/2026/05/08/i...
  • 0
  • 1
  • 0
  • 2h ago
Profile picture fallback
Ivanti EPMM Under Fire: CVE-2026-6973 Admin‑Auth 0‑Day Already Weaponized – Patch Now! + Video Introduction: Ivanti’s Endpoint Manager Mobile (EPMM) on‑premises product is currently under active attack due to a newly disclosed zero‑day vulnerability, tracked as CVE‑2026‑6973. Although exploitation…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
  • 0
  • 0
  • 1
  • 21h ago
Profile picture fallback
~Cisa~ CISA added CVE-2026-6973, an actively exploited Ivanti EPMM vulnerability, to its KEV catalog. - IOCs: CVE-2026-6973 - #CVE2026_6973 #Ivanti #ThreatIntel
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity […]
  • 0
  • 0
  • 1
  • 17h ago
Profile picture fallback
Ivanti EPMMのCVE-2026-6973 RCE脆弱性が実際に悪用され、管理者レベルのアクセス権が付与される Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #HackerNews (May 7) thehackernews.com/2026/05/ivan...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 7) CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) の不適切な入力検証の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Ivanti reveals CVE-2026-6973, a critical remote code execution flaw in Endpoint Manager Mobile 12.8.0.0 and earlier, exploited in limited zero-day attacks. Additional patches released, admins urged to review credentials. #Ivanti #ZeroDay #USA
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access reconbee.com/ivanti-epmm-... #Ivanti #EPMM #adminlevelaccess #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA
  • 0
  • 0
  • 1
  • 7h ago
Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) 📖 Read more: www.helpnetsecurity.com/2026/05/08/i... #cybersecurity #cybersecuritynews #0day #endpointmanagement #vulnerability
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Ivanti、ゼロデイに悪用可能な欠陥含むEPMMの脆弱性を複数修正(CVE-2026-6973、CVE-2026-7821他) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45488/
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
08 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 16 Posts
  • 130 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

lwn.net/Articles/1071719/

#DirtyFrag is a broken embargo.

Local Privilege Escalation to root.

Public working exploit. No CVE assigned yet.

No fix in sight.
<edit> 7.0.5 was just released which has a fix </edit>
<edit 2> CVE-2026-43284 has been assigned</edit 2>

#infosec #cyber #tsunamiofvulns #CVE-2026-43284

This is the documentation & exploit of DirtyFrag:
github.com/V4bel/dirtyfrag/blo

  • 25
  • 18
  • 0
  • 17h ago
Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 30
  • 19
  • 0
  • 4h ago
Profile picture fallback

L'ensemble de notre parc infogéré est immunisé contre la faille Dirty Frag (CVE-2026-43284) depuis ce matin 08h59.

En gros, c'est l'enfant maudit de Dirty Pipe et Copy Fail qui permet une élévation locale de privilèges qui fonctionne très bien.

En savoir plus sur la faille-> github.com/V4bel/dirtyfrag#dir

  • 3
  • 2
  • 0
  • 8h ago
Profile picture fallback
Happy Frid^WCVE-2026-43284

#Linux #DirtyFrag #CopyFail
  • 1
  • 0
  • 0
  • 8h ago
Profile picture fallback

OhMyDebn 3.7.1 now available with mitigation for Dirty Frag local privilege escalation (CVE-2026-43284)

OhMyDebn is a debonair Linux desktop for power users. It gives you the stability of the Debian distro, the ease of use of the Cinnamon desktop, and the power of AI, containers, and virtualization.

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

[related]
chez AlmaLinux

"Dirty Frag (CVE-2026-43284) vulnerability fix is ready for testing"
👇
almalinux.org/blog/2026-05-07-

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback

Nouveaux kernels stables : 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138

Ils embarquent un fix partiel pour (CVE-2026-43284) et Copy Fail 2.

Partiel, car Greg Kroah-Hartman a confirmé qu'un second patch est encore en développement et n'a pas encore été mergé.

La mitigation par blacklist des modules reste donc recommandée en attendant.
👇
lwn.net/Articles/1071775/

  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback

Apparently there's yet another Local Privilege Escalation . There's a mitigation that disables esp4, esp6 and rxrpc modules.

openwall.com/lists/oss-securit

github.com/V4bel/dirtyfrag

EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. nvd.nist.gov/vuln/detail/CVE-2 nvd.nist.gov/vuln/detail/CVE-2

  • 8
  • 7
  • 0
  • 20h ago
Profile picture fallback

Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.

Hope this helps others.

NOTE: I have edited this post to better outline the fixes and improve terminology. Plus we've got a CVE designation for dirty frag now.

## Linux Kernel LPE Roundup — May 8, 2026

Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here's what you need to know:

### 1. Copy Fail (CVE-2026-31431)

Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.

Mitigation: Apply your distro's kernel update, or prevent the module from loading:

echo 'install algif_aead /bin/false' > /etc/modprobe.d/copyfail.conf

copy.fail/

### 2. Dirty Frag (CVE-2026-43284)

Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.

Mitigation: Prevent the modules from loading:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf

Then unload them if currently loaded:

rmmod esp4 esp6 rxrpc 2>/dev/null

github.com/V4bel/dirtyfrag/

### 3. Copy Fail 2: Electric Boogaloo (no CVE yet)

xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.

Mitigation: Same esp4 modprobe override as Dirty Frag covers this.

github.com/0xdeadbeefnetwork/C

### 4. io_uring ZCRX Freelist LPE (no CVE yet)

Out-of-bounds write in io_uring's zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.

Mitigation: Check if you're affected:

grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config

No output or "is not set" means you're not vulnerable.

ze3tar.github.io/post-zcrx.html

### Note

If any of these modules are built into your kernel (=y rather than =m), the modprobe approach won't work — you'll need initcall_blacklist= on the kernel command line instead. Check with:

grep -E 'CONFIG_INET_ESP=|CONFIG_INET6_ESP=|CONFIG_AF_RXRPC=|CONFIG_CRYPTO_USER_API_AEAD=' /lib/modules/$(uname -r)/config

#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin

  • 5
  • 2
  • 0
  • 14h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 2h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 1h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 6h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
CVE-2026-43284がアサインされた模様です。 www.cve.org/CVERecord?id...
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
07 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
4.65%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 13 Posts
  • 6 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Critical Palo Alto PAN-OS Zero-Day CVE-2026-0300 Actively Exploited — Root Access Granted on 5,800+ Exposed Firewalls
#CyberSecurity
securebulletin.com/critical-pa

  • 5
  • 0
  • 0
  • 22h ago
Profile picture fallback

The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the User-ID Authentication Portal service of Palo Alto Networks PAN-OS software that could allow an unauthenticated attacker to execute arbitrary code with root privileges by sending specially crafted packets. thehackernews.com/2026/05/pan-

  • 0
  • 0
  • 1
  • 3h ago

Bluesky

Profile picture fallback
Palo Alto warns of actively exploited PAN-OS firewall flaw Palo Alto Networks has disclosed a critical vulnerability in multiple PAN-OS versions, tracked as CVE-2026-0300 (CVSS 9.3), that allows unauthenticated remote attackers to execute arbitrary code with root privileges on affected firewalls.…
  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback
Palo Alto Networks disclosed CVE-2026-0300, a zero-day vulnerability in PA and VM series firewalls allowing unauthenticated remote code execution, exploited by a likely state-sponsored threat group with evidence pointing to China.
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Palo Alto Networks disclosed CVE-2026-0300, a critical buffer overflow vulnerability in PAN-OS User-ID Authentication Portal allowing unauthenticated remote code execution, with exploitation attempts detected since April 9, 2026.
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
CVE-2026-0300: UNPATCHED PAN-OS ZERO-DAY UNDER ACTIVE EXPLOITATION—SECURE YOUR FIREWALLS NOW Introduction: A critical, unpatched buffer overflow vulnerability (CVE-2026-0300, CVSS 9.3) is being actively exploited in the wild against Palo Alto Networks PA-Series and VM-Series firewalls when the…
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
The latest update for #ArcticWolf includes "CVE-2026-0300 — Critical Buffer Overflow in PAN-OS User-ID Authentication Portal" and "Should Your Organization Rely on #XDR For #Cybersecurity?". #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
The latest update for #Foresiet includes "CVE-2026-0300: Unauthenticated Root RCE via Buffer Overflow in Palo Alto PAN-OS User-ID Authentication Portal" and "The April 2026 #AI Security Report: 6 Incidents and Detailed Attack Paths". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
⚠️ Une faille critique dans #PaloAlto PAN-OS (CVE-2026-0300) permet une exécution de code à distance sans authentification. Exploitation active détectée sur le terrain. Score CVSS : 9.3. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Palo Alto Networks reveals active exploitation of zero-day CVE-2026-0300 in PA and VM firewalls, enabling unauthenticated root access. Attack linked to Chinese state group CL-STA-1132 using Earthworm and ReverseSocks5. #China #PaloAlto #ZeroDay
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
【脆弱性】CVE-2026-0300とは?Palo Alto Networks製PAN-OSの重大脆弱性と企業が取るべき対策を解説 2026年5月、Palo Alto NetworksのファイアウォールOS「PAN-OS」に関する重大な脆弱性「CVE-2026-0300」が公表されました。この脆弱性は、条件を満たす機器に対して外部から攻撃されるおそれがあり、すでに実際の悪用も確認されています。
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
📢 Exploitation active de CVE-2026-0300 : RCE critique dans PAN-OS par un acteur étatique 📝 ## 🗓️ Contexte Publié le 8 mai 2026 par Truesec, cet art… https://cyberveille.ch/posts/2026-05-08-exploitation-active-de-cve-2026-0300-rce-critique-dans-pan-os-par-un-acteur-etatique/ #CL_STA_1132 #Cyberveille
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 10 Posts
  • 81 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 30
  • 19
  • 0
  • 4h ago
Profile picture fallback

and we have another one. This one with CVE.

#dirtyfrag #CVE-2026-43500

  • 5
  • 3
  • 0
  • 1h ago
Profile picture fallback

Why wait for the slow UEFI when you can just `systemctl kexec` to remediate Dirty Frag with (almost) sub- 1 Minute downtime (2nd reboot for CVE-2026-43500 follows)
(all VMs except the pinned ones have been migrated off before)

  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback

Apparently there's yet another Local Privilege Escalation . There's a mitigation that disables esp4, esp6 and rxrpc modules.

openwall.com/lists/oss-securit

github.com/V4bel/dirtyfrag

EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. nvd.nist.gov/vuln/detail/CVE-2 nvd.nist.gov/vuln/detail/CVE-2

  • 8
  • 7
  • 0
  • 20h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 2h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 1h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 6h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
CVE-2026-43500も追加でアサインされるそうです(まだCVE自体は公開されていません)
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.91%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 6 Posts
  • 36 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CopyFail (CVE-2026-31431) is a high-severity Linux kernel vulnerability -- patches are out now for Rocky Linux 8.10, 9.8, and 10.1.

Any unprivileged local user can escalate to root in seconds. Multi-tenant hosts, containers, and CI runners should prioritize this one.

Fix it with:
sudo dnf --refresh update 'kernel*'

Full write-up on the blog:
forums.rockylinux.org/t/copyfa
#RockyLinux #Linux #OpenSource #LinuxSecurity #CopyFail

  • 6
  • 11
  • 0
  • 22h ago
Profile picture fallback

ICYMI: CVE-2026-31431 (Copy Fail) gives any unprivileged local user a ROOT SHELL. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more.

➡️➡️ Watch Here: youtu.be/LwqEUiuXmbg

  • 0
  • 1
  • 0
  • 22h ago
Profile picture fallback

variante peu sympa 👀
"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."
⬇️
github.com/0xdeadbeefnetwork/C

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

⚠️ PSA: patch your AlmaLinux systems.

Copy Fail lets any local user escalate to root. We shipped fixes for AL 8, 9 & 10 ahead of upstream—they're in production now. almalinux.org/blog/2026-05-01-

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.

Hope this helps others.

NOTE: I have edited this post to better outline the fixes and improve terminology. Plus we've got a CVE designation for dirty frag now.

## Linux Kernel LPE Roundup — May 8, 2026

Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here's what you need to know:

### 1. Copy Fail (CVE-2026-31431)

Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.

Mitigation: Apply your distro's kernel update, or prevent the module from loading:

echo 'install algif_aead /bin/false' > /etc/modprobe.d/copyfail.conf

copy.fail/

### 2. Dirty Frag (CVE-2026-43284)

Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.

Mitigation: Prevent the modules from loading:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf

Then unload them if currently loaded:

rmmod esp4 esp6 rxrpc 2>/dev/null

github.com/V4bel/dirtyfrag/

### 3. Copy Fail 2: Electric Boogaloo (no CVE yet)

xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.

Mitigation: Same esp4 modprobe override as Dirty Frag covers this.

github.com/0xdeadbeefnetwork/C

### 4. io_uring ZCRX Freelist LPE (no CVE yet)

Out-of-bounds write in io_uring's zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.

Mitigation: Check if you're affected:

grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config

No output or "is not set" means you're not vulnerable.

ze3tar.github.io/post-zcrx.html

### Note

If any of these modules are built into your kernel (=y rather than =m), the modprobe approach won't work — you'll need initcall_blacklist= on the kernel command line instead. Check with:

grep -E 'CONFIG_INET_ESP=|CONFIG_INET6_ESP=|CONFIG_AF_RXRPC=|CONFIG_CRYPTO_USER_API_AEAD=' /lib/modules/$(uname -r)/config

#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin

  • 5
  • 2
  • 0
  • 14h ago

Bluesky

Profile picture fallback
CopyFail (CVE-2026-31431) is serious. Patches are out now for Rocky Linux 8.10, 9.8, and 10.1. One command and a reboot gets you covered. Full details in the blog. Stay patched. 🐧 sudo dnf --refresh update 'kernel*' #RockyLinux #Linux #LinuxSecurity
  • 3
  • 8
  • 0
  • 22h ago

Overview

  • xz
  • xz

29 Mar 2024
Published
20 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
85.06%

KEV

Description

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 3 hours ago

Bluesky

Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 | Discussion
  • 1
  • 1
  • 0
  • 14h ago
Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 github.com/robertdfrenc... (news.ycombinator.com/item?id=4805...)
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 https://github.com/robertdfrench/ifuncd-up https://news.ycombinator.com/item?id=48056749
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 9 hours ago

Bluesky

Profile picture fallback
[RSS] CVE-2026-42511 Breakdown: RCE in FreeBSD aisle.com -> Original->
  • 0
  • 1
  • 0
  • 9h ago
Profile picture fallback
CVE-2026-42511 Breakdown: RCE in FreeBSD
  • 0
  • 0
  • 1
  • 23h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
64.28%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-41940 was exploited for 64 days before a patch existed. First attack: Feb 23. Advisory: Apr 28.

After disclosure, 15,448 cPanel hosts in malicious activity on May 1 alone. Ransomware and a Mirai botnet running in parallel. CVSS 9.8. CISA KEV.

We built a free scanner. No account needed.

pentest-tools.com/network-vuln

  • 0
  • 1
  • 0
  • 9h ago

Bluesky

Profile picture fallback
🟢 Cómo solucionar la #vulnerabilidad CVE-2026-41940 en cPanel/WHM: Parche de seguridad urgente para acceso root www.newstecnicas.com/2026/05/solu...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
📢 CVE-2026-41940 : exploitation massive de cPanel/WHM avec déploiement de Mirai et ransomware 📝 ## 🔍 Contexte Le 1er mai 2026, l'équipe Ce… https://cyberveille.ch/posts/2026-05-08-cve-2026-41940-exploitation-massive-de-cpanel-whm-avec-deploiement-de-mirai-et-ransomware/ #CVE_2026_41940 #Cyberveille
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Android

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 3 Posts
  • 26 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-0073 is a Critical severity Remote Code Execution (RCE) vulnerability included as the only vulnerability fixed in the May 2026 Android Security Bulletin. GrapheneOS first shipped the patch in our 2026030501 security preview release on March 5th. It also isn't nearly as severe as it sounds.

  • 5
  • 21
  • 1
  • 15h ago

Bluesky

Profile picture fallback
📢 CVE-2026-0073 : Bypass d'authentification critique dans ADB-over-TCP d'Android permettant une RCE 📝 ## 🔍 Contexte Publié le 5 mai 2026 par BA… https://cyberveille.ch/posts/2026-05-08-cve-2026-0073-bypass-d-authentification-critique-dans-adb-over-tcp-d-android-permettant-une-rce/ #ADB #Cyberveille
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Azure DevOps

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.09%

KEV

Description

Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized attacker to disclose information over a network.

Statistics

  • 2 Posts
  • 6 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Oh, neat, the daily MS CVSS 10 :apartyblobcat:

nvd.nist.gov/vuln/detail/cve-2

  • 2
  • 3
  • 0
  • Last hour
Profile picture fallback

🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 13h ago
Showing 1 to 10 of 116 CVEs