Local Privilege Escalation in Snapd Affecting Ubuntu Linux
CVE-2026-3888

7.8HIGH

Key Information:

Vendor
CVE Published:
17 March 2026

Badges

📈 Score: 486👾 Exploit Exists🟡 Public PoC

What is CVE-2026-3888?

CVE-2026-3888 is a local privilege escalation vulnerability found in the Snapd system for managing software packages on Ubuntu Linux. Snapd facilitates the deployment and management of applications in a secure and sandboxed environment. The vulnerability stems from the way Snapd manages its private /tmp directory, specifically when systemd-tmpfiles is configured to automatically clean this directory. Attackers with local access can exploit this flaw to recreate the /tmp directory, thereby gaining root privileges on the system. This escalation of privileges could enable attackers to perform unauthorized actions, potentially compromising the system's integrity and security. Affected versions include Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Potential impact of CVE-2026-3888

  1. Unauthorized System Access: Attackers can escalate their privileges from a local user to root, allowing them to execute arbitrary commands, modify system configurations, and access sensitive data that may otherwise be protected.

  2. Compromise of System Integrity: With root access, an attacker could manipulate system files and processes, leading to a complete loss of integrity of the system. This could result in unauthorized changes to critical applications, installation of malicious software, or suppression of security mechanisms.

  3. Threat of Escalated Attacks: As a vulnerability that can grant heightened privileges, CVE-2026-3888 could serve as a gateway for further attacks. Once attackers gain root access, they can launch additional malware or facilitate lateral movement within networks, increasing the potential damage to an organization’s infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Qualys Security Advisory Team
.