Vulnerability in Linux Kernel Affecting Crypto Operations
CVE-2026-31431

7.8HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
22 April 2026

Badges

🥇 Trended No. 1📈 Trended📈 Score: 428,000💰 Ransomware👾 Exploit Exists🟡 Public PoC🦅 CISA Reported📰 News Worthy

What is CVE-2026-31431?

CVE-2026-31431 is a vulnerability identified in the Linux kernel, specifically affecting the crypto operations related to the algif_aead interface. The Linux kernel serves as the core component of Linux operating systems, managing system resources and providing essential services to applications. This vulnerability arises from a regression in how crypto operations handle data. Essentially, the flawed implementation sought to perform operations in-place, which added unnecessary complexity without delivering tangible benefits. By reverting to a more straightforward approach that directly copies associated data, the risk associated with this vulnerability can be significantly mitigated.

Organizations utilizing affected versions of the Linux kernel may face security risks if the vulnerability is not addressed, as it could potentially compromise the integrity of cryptographic operations, critical for maintaining data confidentiality and security processes across various applications and services.

Potential impact of CVE-2026-31431

  1. Risk to Data Integrity: The vulnerability can compromise the correctness of cryptographic operations, which could lead to unauthorized data alteration or corruption. This is particularly concerning for applications relying on cryptography to protect sensitive information.

  2. Increased Complexity in Security: The flawed in-place operation introduced additional complexity, which could lead to implementation errors or oversights in security measures. This complexity may reduce the overall resilience of applications relying on the affected kernel functionality.

  3. Potential for Exploitation: Although there are no current exploits reported in the wild, the existence of this vulnerability creates a potential attack vector for threat actors. As observed with similar vulnerabilities, the likelihood of future exploitation remains a concern, emphasizing the need for timely patching and proactive security measures.

CISA has reported CVE-2026-31431

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-31431 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Linux 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 < 893d22e0135fa394db81df88697fba6032747667

Linux 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 < 19d43105a97be0810edbda875f2cd03f30dc130c

Linux 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 < 961cfa271a918ad4ae452420e7c303149002875b

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Debian-based Parrot 7.2 lands with multiple tweaks and fixes

In addition to the 6.19.13 kernel, which comes with a patch for the "Copy Fail" bug, Parrot OS 7.2 comes with significant updates to parrot-menu and several other tools, as well as an alignment with the Debian project. Thanks to it, this release syncs Parrot with the latest Debian upstream updates.

2 days ago

Microsoft Issues Warning About Linux 'Copy Fail' Vulnerability - Slashdot

joshuark shares a report from Linux Magazine: Microsoft has issued a warning that a vulnerability with a CVSS score of 7.8 has been found in the Linux kernel. The vulnerability in question is tagged CVE-2026-31431 and, according to the Cybersecurity and Infrastructure Security Agency (CISA), "This ...

4 days ago

How Cloudflare Dodged a Linux Kernel Bullet With BPF and Fast Patches

Copy Fail (CVE-2026-31431) let unprivileged users gain root on most Linux systems via a 732-byte script. Cloudflare combined existing detection, bpf-lsm policies, and targeted patching to protect its fleet in hours without disruption. The case reveals how runtime kernel controls and visibility limit...

4 days ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 🦅

    CISA Reported

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by News9live

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

.