Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26157: External Control of File Name or Path in Red Hat Red Hat Enterprise Linux 6

0
High
VulnerabilityCVE-2026-26157cvecve-2026-26157
Published: Wed Feb 11 2026 (02/11/2026, 20:27:06 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:29:09 UTC

Technical Analysis

CVE-2026-26157 is a vulnerability identified in BusyBox, specifically within its archive extraction utilities used in Red Hat Enterprise Linux 6. The root cause is incomplete path sanitization during the extraction process, which allows an attacker to craft malicious archive files containing paths that traverse outside the intended extraction directory (e.g., via directory traversal sequences like '../'). When such an archive is extracted under specific conditions, it can overwrite arbitrary files on the filesystem. This arbitrary file overwrite can be leveraged to modify sensitive system files, potentially leading to privilege escalation or arbitrary code execution if critical binaries or configuration files are replaced or altered. The vulnerability requires local access with low privileges and user interaction to extract the malicious archive, which somewhat limits remote exploitation but still poses a significant risk in multi-user or shared environments. The CVSS 3.1 score of 7.0 reflects a high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the potential for damage is substantial, especially in environments where untrusted archives are handled. Red Hat Enterprise Linux 6, despite being an older release, remains in use in some legacy systems, making this vulnerability relevant for organizations maintaining such environments. The lack of patch links suggests that users should monitor Red Hat advisories closely for updates or consider upgrading to newer supported versions.

Potential Impact

The vulnerability allows attackers to overwrite arbitrary files on affected systems, which can compromise system integrity and confidentiality. By modifying critical system files or binaries, attackers may achieve arbitrary code execution, leading to full system compromise. This can disrupt availability if system files are corrupted or replaced with malicious versions. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where users can be tricked into extracting malicious archives, such as shared hosting, development environments, or multi-user systems. Organizations relying on RHEL 6 for critical infrastructure or legacy applications face increased risk of data breaches, service disruption, and unauthorized access. The potential impact extends to compliance violations and reputational damage if exploited.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the BusyBox archive extraction utilities vulnerability. 2. Until patches are applied, restrict the extraction of untrusted archives, especially those received from external or unverified sources. 3. Implement strict file system permissions and use sandboxing or containerization to limit the impact of archive extraction operations. 4. Educate users about the risks of extracting archives from untrusted sources and enforce policies to minimize user interaction with potentially malicious files. 5. Monitor system logs for unusual file modifications or extraction activities that could indicate exploitation attempts. 6. Consider upgrading from RHEL 6 to a more recent, supported version of Red Hat Enterprise Linux that includes updated BusyBox versions with this vulnerability fixed. 7. Use file integrity monitoring tools to detect unauthorized changes to critical system files promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-11T17:05:41.991Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cea984b57a58fa1c97f49

Added to database: 2/11/2026, 8:46:16 PM

Last enriched: 2/26/2026, 3:29:09 PM

Last updated: 3/29/2026, 1:46:26 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses