Local Privilege Escalation in Snapd Affecting Ubuntu Linux
CVE-2026-3888
Key Information:
- Vendor
- CVE Published:
- 17 March 2026
Badges
What is CVE-2026-3888?
CVE-2026-3888 is a local privilege escalation vulnerability found in the Snapd system for managing software packages on Ubuntu Linux. Snapd facilitates the deployment and management of applications in a secure and sandboxed environment. The vulnerability stems from the way Snapd manages its private /tmp directory, specifically when systemd-tmpfiles is configured to automatically clean this directory. Attackers with local access can exploit this flaw to recreate the /tmp directory, thereby gaining root privileges on the system. This escalation of privileges could enable attackers to perform unauthorized actions, potentially compromising the system's integrity and security. Affected versions include Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Potential impact of CVE-2026-3888
-
Unauthorized System Access: Attackers can escalate their privileges from a local user to root, allowing them to execute arbitrary commands, modify system configurations, and access sensitive data that may otherwise be protected.
-
Compromise of System Integrity: With root access, an attacker could manipulate system files and processes, leading to a complete loss of integrity of the system. This could result in unauthorized changes to critical applications, installation of malicious software, or suppression of security mechanisms.
-
Threat of Escalated Attacks: As a vulnerability that can grant heightened privileges, CVE-2026-3888 could serve as a gateway for further attacks. Once attackers gain root access, they can launch additional malware or facilitate lateral movement within networks, increasing the potential damage to an organization’s infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
