Ubuntu vulnerability exposes enterprises to root escalation, complete system compromise
The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Just a week after revealing critical vulnerabilities in Linux’s AppArmor security layer, Qualys researchers are warning of a flaw affecting Ubuntu that can also allow an unprivileged user to gain full root access.
The high‑severity Local Privilege Escalation vulnerability, tracked as CVE‑2026‑3888, affects default installations of Ubuntu Desktop 24.04 and later.
The flaw allows an unprivileged local attacker to escalate privileges to full root access by exploiting an unexpected interaction between two trusted system components: snap‑confine.
This manages execution environments for snap applications and systemd-tmpfiles, which automatically cleans up temporary files and directories older than a defined threshold.
While the exploit requires a specific time‑based window that varies between 10 and 30 days depending on the version of Ubuntu, a successful attack could result in complete system compromise, researchers warned.
How the Ubuntu vulnerability works
The flaw identified by Qualys works by abusing the cleanup behavior of systemd‑tmpfiles.
Once a critical directory required by snap-confine, tmp/.snap, is automatically deleted by the system's cleanup daemon, an attacker can recreate it with malicious content.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Then, during the next sandbox initialization, snap‑confine bind‑mounts the attacker‑controlled files as root, enabling arbitrary code execution with full privileges.
"Think of it this way: the system’s housekeeping service unknowingly clears a secure room, and an attacker slips in to rebuild it with their own materials — so when the security team returns, they lock in the attacker’s setup and hand over full access," researchers said.
Patch issued, but be wary
CVE-2026-3888 carries a CVSS v3.1 score of 7.8 (High), and organizations are advised to apply patches immediately.
The flaw has already been patched in Ubuntu 24.04 LTS onward, with other versions including:
- snapd versions prior to 2.73+ubuntu24.04.1
- Ubuntu 25.10 LTS - snapd versions prior to 2.73+ubuntu25.10.1
- Ubuntu 26.04 LTS (Dev) - snapd versions prior to 2.74.1+ubuntu26.04.1
- upstream snapd - versions prior to 2.75
While older Ubuntu LTS releases from 16.04 through 22.04 aren't vulnerable in default configurations, Qualys still recommends applying the patch as a precaution in cases where non-default setups might resemble the behavior of newer releases.
Separate Ubuntu desktop flaw identified
Almost as an aside, Qualys said it had also discovered a separate vulnerability through a proactive security effort prior to the release of Ubuntu Desktop 25.10.
A race condition in the rm utility allowed an unprivileged local attacker to replace directory entries with symlinks during root-owned cron executions.
Successful exploitation could potentially lead to arbitrary file deletion as root or further privilege escalation by targeting snap sandbox directories.
"The vulnerability was reported and mitigated prior to the public release of Ubuntu 25.10," said Saeed Abbasi, senior manager of Qualys's Threat Research Unit.
"The default rm command in Ubuntu 25.10 was reverted to GNU coreutils to mitigate this risk immediately. Upstream fixes have since been applied to the uutils repository."
FOLLOW US ON SOCIAL MEDIA
Follow ITPro on Google News and add us as a preferred source to keep tabs on all our latest news, analysis, views, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
GoTo launches new LogMeIn Partner Network to drive MSP growthNews The new channel initiative introduces new tools, incentives, and support to help partners scale services and grow recurring revenue.
-
The UK government wants to be a global leader in quantum computing, but is the country prepared?News £2 billion in funding aims is to make the UK a world leader in quantum computing by 2030, but some industry stakeholders think it's a bridge too far
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
