Aggregator
CVE-2025-14543 | RTI Connext Professional prior 7.7.0 xml external entity reference
CVE-2026-38940 | RafyMrX TOKO-ONLINE-ROTI 1.0 detail_produk.php cross site scripting
CVE-2026-38939 | andrewtch88 mvc-ecommerce 1.0 product_catalogue.php cross site scripting
Qilin Ransomware Enumerates RDP Authentication History on a Compromised Server
Qilin ransomware is one of the most active and damaging threats in the cyber landscape today. The group has steadily evolved its tactics since it first appeared in 2022, and its latest technique of enumerating Remote Desktop Protocol (RDP) authentication history on compromised servers gives it a fast, quiet way to map out a network […]
The post Qilin Ransomware Enumerates RDP Authentication History on a Compromised Server appeared first on Cyber Security News.
ИИ не нужен разум, чтобы восстать против нас. Эволюция выберет тех, кто игнорирует запреты — и это уже началось
Three Arrested for Hacking Over 610,000 Roblox Accounts
SecWiki News 2026-04-30 Review
更多最新文章,请访问SecWiki
Langflow 1.8.3 CodeParser eval() —RCE漏洞分析+POC
墨思AI AGENT监测发现 PyTorch Lightning 训练框架被投毒,月下载量超1000万
Targeted Large-Scale Campaign Attacking U.S. Organizations with Fake Event Invitations
A large-scale phishing campaign is actively targeting organizations across the United States, using fake event invitations to deceive employees into handing over their corporate login credentials. The operation is wide in reach and strikes some of the most sensitive sectors in the country, including banking, government, technology, and healthcare, pointing to a deliberate effort to […]
The post Targeted Large-Scale Campaign Attacking U.S. Organizations with Fake Event Invitations appeared first on Cyber Security News.
Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerability
A flaw in the Linux kernel present since 2017 allows a local user to gain root access on virtually every major Linux distribution. A public exploit is available and reported to work reliably.
Key Takeaways- CVE-2026-31431 is a high severity local privilege escalation vulnerability in the Linux kernel reportedly affecting virtually every major distribution released since 2017.
- A public exploit is available and reported to be reliable, drawing comparisons to previous high-profile Linux kernel privilege escalation flaws.
- Patched kernel versions are available, though some major distributions have not yet shipped updates.
Tenable's Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding CVE-2026-31431, a Linux kernel local privilege escalation vulnerability dubbed "Copy Fail."
FAQWhen was Copy Fail first disclosed?
On March 23, researcher Taeyang Lee of Theori reported the vulnerability to the Linux kernel security team. The flaw was discovered in part using Theori's AI-assisted security scanning tool, Xint Code. A mainline patch was committed on April 1, CVE-2026-31431 was assigned on April 22 and public disclosure occurred on April 29.
What is CVE-2026-31431?
CVE-2026-31431 is a local privilege escalation vulnerability in the Linux kernel's cryptographic subsystem. It was assigned a CVSSv3 score of 7.8.
CVEDescriptionCVSSv3CVE-2026-31431Linux Kernel Local Privilege Escalation Vulnerability7.8The flaw allows a local user to modify the kernel's cached copy of a file in memory without changing the file on disk. By targeting a privileged binary, an attacker can gain root access. Because the modification exists only in the page cache, the underlying file on disk remains unchanged. Standard disk forensics would not detect the alteration, and clearing memory through a reboot or resource pressure causes the cache to reload from the original file. For a detailed technical breakdown, refer to the Xint Code blog post.
Everyone focuses on memory corruption bugs in the Linux kernel, but we shouldn’t overlook logical bugs. https://t.co/PrSI435i35
— 5unkn0wn (@5unKn0wn) April 30, 2026
How does Copy Fail compare to Dirty Cow and Dirty Pipe?
Copy Fail has drawn comparisons to two other well-known Linux kernel privilege escalation vulnerabilities: Dirty Cow (CVE-2016-5195) and Dirty Pipe (CVE-2022-0847). Both are in the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog.
Dirty Cow relied on a race condition, which meant exploitation could fail or require multiple attempts. Dirty Pipe had constraints around how data could be written and where in a file it could be modified. Copy Fail reportedly works consistently across distributions without relying on a race condition or write-position constraints.
How severe is CVE-2026-31431?
Any local user on a system running a vulnerable kernel can exploit this flaw to gain root access. The exploit uses kernel features that are enabled by default on most distributions and does not require special privileges or configuration.
The highest risk environments are those where multiple users or workloads share a Linux kernel: cloud and multi-tenant systems, container clusters and CI/CD pipelines that run untrusted code. Because the exploit targets the kernel's shared file cache, it can also cross container boundaries. On single-user systems, the risk is lower since an attacker would already need local access.
Which Linux distributions are affected?
Any Linux distribution shipping kernel 4.14 or later is affected. The vulnerability was introduced in 2017 and persisted across nearly a decade of kernel releases. Distribution patch status as of April 30:
DistributionPatch StatusUbuntuPatchingSUSEPatchingRed HatPatchingDebianVulnerableAmazon LinuxVulnerableArch LinuxPatchedIs there a proof-of-concept (PoC) available?
Yes. A public PoC was released on GitHub alongside the disclosure. The exploit is a short Python script that modifies a privileged binary in memory and then executes it to obtain root. It is reported to work reliably without requiring multiple attempts or precise timing.
Are there other vulnerabilities related to Copy Fail?
According to Theori, the same research effort that uncovered Copy Fail found additional security flaws in the kernel, at least one of which is also a privilege escalation issue. Those findings remain under coordinated disclosure. This blog will be updated if and when additional information becomes available.
Are patches or mitigations available?
Patched kernel versions have been released:
Affected Kernel Version RangeFixed Kernel Version4.14N/A5.10.*5.10.2545.15.*5.15.2046.1.*6.1.1706.6.*6.6.1376.12.*6.12.856.18.*6.18.226.19.126.19.12>7.07.0The fix removes the 2017 optimization that allowed the vulnerability, restoring a safer separation between read and write operations in the kernel's crypto interface.
For systems where an immediate kernel update is not feasible, two workarounds are available depending on kernel configuration.
If the module is loaded dynamically (CONFIG_CRYPTO_USER_API_AEAD=m):
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || trueIf the module is compiled into the kernel (CONFIG_CRYPTO_USER_API_AEAD=y), which is the case on some enterprise kernels, the above will not work. Contributors on the oss-security mailing list have reported that adding the following to the kernel boot parameters and rebooting blocks the exploit:
initcall_blacklist=algif_aead_initDiscussion on the oss-security mailing list has also identified several userspace applications that use the affected kernel interface, including but not limited to, cryptsetup and firefox-esr. In practice, initial testing by contributors on the thread has not caused these applications to fail, but the impact may vary by workload. Testing in a non-production environment before deploying either workaround is advisable.
Historical exploitation of Linux kernel vulnerabilities
The Linux kernel has a long history as a target for privilege escalation attacks. CISA's KEV catalog contains over 20 entries for Linux kernel flaws, including the two flaws most commonly compared to Copy Fail:
CVEDescriptionDate Added to KEVKnown Ransomware UseCVE-2016-5195Linux Kernel Race Condition (Dirty Cow)2022-03-03UnknownCVE-2022-0847Linux Kernel Improper Initialization (Dirty Pipe)2022-04-25UnknownAs of April 30, CVE-2026-31431 is not listed in the KEV catalog.
Has Tenable Research classified this as part of Vulnerability Watch?
Yes, we classified CVE-2026-31431 as a Vulnerability of Interest under Vulnerability Watch due to the availability of a public proof-of-concept exploit and historical exploitation of similar Linux kernel vulnerabilities like Dirty Cow and Dirty Pipe that were exploited in the wild.
Has Tenable released any product coverage for this vulnerability?
A list of Tenable plugins for this vulnerability can be found on the CVE-2026-31431 page as they're released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.
Get more information- Copy Fail Advisory
- Xint Code Blog: Copy Fail Linux Distributions
- The Register: Linux Cryptographic Code Flaw
- oss-security: CVE-2026-31431 Disclosure
Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
【资料】民间社会视角:西非的恐怖主义与反恐行动
【情报报告】2026年4月全球恐怖主义态势及战略预测
New PhaaS Platform Phoenix Drives Brand-Impersonation Smishing Across Finance, Telecom, and Logistics
A dangerous new phishing platform called Phoenix is quietly spreading across the globe, targeting people through fake SMS messages designed to look like they come from trusted banks, telecom providers, and delivery companies. This platform works on a subscription basis, making it easy for cybercriminals with limited technical skills to launch large-scale smishing campaigns in […]
The post New PhaaS Platform Phoenix Drives Brand-Impersonation Smishing Across Finance, Telecom, and Logistics appeared first on Cyber Security News.
CVE-2026-7513 | UTT HiPER 1200GW up to 2.5.3-170306 formRemoteControl strcpy buffer overflow
CVE-2026-7512 | UTT HiPER 1200GW up to 2.5.3-1703 /goform/formUser strcpy buffer overflow
Антивирус как всегда ни при чем. Рассказываем о схеме, которая вербует ИИ-агентов в ботнеты нового типа
FBI and CISA Released Zero Trust Principles Implementation Guide for OT Environments
The FBI and CISA, the Department of Energy (DOE), and defense partners published a joint intelligence document. Titled “Adapting Zero Trust Principles to Operational Technology,” this guide provides critical infrastructure operators with a strategic roadmap to secure industrial systems against modern cyber threats. Historically, operational technology (OT) networks relied heavily on strong perimeter defenses. This […]
The post FBI and CISA Released Zero Trust Principles Implementation Guide for OT Environments appeared first on Cyber Security News.