Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26157: External Control of File Name or Path in Red Hat Red Hat Enterprise Linux 6

0
High
VulnerabilityCVE-2026-26157cvecve-2026-26157
Published: Wed Feb 11 2026 (02/11/2026, 20:27:06 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.

AI-Powered Analysis

AILast updated: 02/11/2026, 21:00:56 UTC

Technical Analysis

CVE-2026-26157 is a vulnerability discovered in BusyBox, specifically within its archive extraction utilities used by Red Hat Enterprise Linux 6. The root cause is incomplete path sanitization during archive extraction, which allows an attacker to craft malicious archive files containing paths that traverse outside the intended extraction directory (e.g., via directory traversal sequences like '../'). When such an archive is extracted under specific conditions, files outside the target directory can be overwritten. This arbitrary file overwrite can be leveraged to modify sensitive system files, potentially leading to privilege escalation or arbitrary code execution. The vulnerability requires local access with low privileges and user interaction to extract the malicious archive, making remote exploitation less straightforward. The CVSS 3.1 score is 7.0 (high), reflecting high impact on confidentiality, integrity, and availability, but with attack vector local and requiring user interaction. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to systems still running RHEL 6, which is used in some legacy environments. The flaw highlights the importance of proper path sanitization in archive utilities to prevent directory traversal and unauthorized file modification.

Potential Impact

For European organizations, especially those running legacy Red Hat Enterprise Linux 6 systems, this vulnerability presents a significant risk. Successful exploitation can lead to arbitrary file overwrite, compromising system integrity and potentially enabling attackers to execute arbitrary code with the privileges of the user extracting the archive. This could result in system compromise, data breaches, or disruption of critical services. Organizations in sectors such as finance, government, and critical infrastructure that rely on RHEL 6 for legacy applications may face operational risks and compliance issues if exploited. The requirement for local access and user interaction somewhat limits the attack surface but does not eliminate risk, particularly in environments with multiple users or where untrusted archives might be processed. The high confidentiality and availability impact could lead to data loss or system downtime, affecting business continuity and trust.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the path sanitization flaw in BusyBox's archive extraction utilities. 2. Until patches are applied, restrict the extraction of archives to trusted sources only and avoid extracting archives from unverified or external origins. 3. Implement strict user permissions and limit local user privileges to reduce the risk of exploitation. 4. Employ file integrity monitoring solutions to detect unauthorized changes to critical system files promptly. 5. Educate users about the risks of extracting untrusted archives and enforce policies to prevent execution of potentially malicious files. 6. Consider upgrading from RHEL 6 to a more recent, supported version of Red Hat Enterprise Linux to benefit from improved security features and ongoing support. 7. Use containerization or sandboxing techniques when handling archive extraction to isolate potential malicious activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-11T17:05:41.991Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cea984b57a58fa1c97f49

Added to database: 2/11/2026, 8:46:16 PM

Last enriched: 2/11/2026, 9:00:56 PM

Last updated: 2/11/2026, 9:58:18 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats