CVE-2026-26157: External Control of File Name or Path in Red Hat Red Hat Enterprise Linux 6
A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.
AI Analysis
Technical Summary
CVE-2026-26157 is a vulnerability identified in BusyBox, specifically within its archive extraction utilities used in Red Hat Enterprise Linux 6. The root cause is incomplete path sanitization during the extraction process, which allows an attacker to craft malicious archive files containing paths that traverse outside the intended extraction directory (e.g., via directory traversal sequences like '../'). When such an archive is extracted under specific conditions, it can overwrite arbitrary files on the filesystem. This arbitrary file overwrite can be leveraged to modify sensitive system files, potentially leading to privilege escalation or arbitrary code execution if critical binaries or configuration files are replaced or altered. The vulnerability requires local access with low privileges and user interaction to extract the malicious archive, which somewhat limits remote exploitation but still poses a significant risk in multi-user or shared environments. The CVSS 3.1 score of 7.0 reflects a high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the potential for damage is substantial, especially in environments where untrusted archives are handled. Red Hat Enterprise Linux 6, despite being an older release, remains in use in some legacy systems, making this vulnerability relevant for organizations maintaining such environments. The lack of patch links suggests that users should monitor Red Hat advisories closely for updates or consider upgrading to newer supported versions.
Potential Impact
The vulnerability allows attackers to overwrite arbitrary files on affected systems, which can compromise system integrity and confidentiality. By modifying critical system files or binaries, attackers may achieve arbitrary code execution, leading to full system compromise. This can disrupt availability if system files are corrupted or replaced with malicious versions. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where users can be tricked into extracting malicious archives, such as shared hosting, development environments, or multi-user systems. Organizations relying on RHEL 6 for critical infrastructure or legacy applications face increased risk of data breaches, service disruption, and unauthorized access. The potential impact extends to compliance violations and reputational damage if exploited.
Mitigation Recommendations
1. Apply official patches from Red Hat as soon as they become available to address the BusyBox archive extraction utilities vulnerability. 2. Until patches are applied, restrict the extraction of untrusted archives, especially those received from external or unverified sources. 3. Implement strict file system permissions and use sandboxing or containerization to limit the impact of archive extraction operations. 4. Educate users about the risks of extracting archives from untrusted sources and enforce policies to minimize user interaction with potentially malicious files. 5. Monitor system logs for unusual file modifications or extraction activities that could indicate exploitation attempts. 6. Consider upgrading from RHEL 6 to a more recent, supported version of Red Hat Enterprise Linux that includes updated BusyBox versions with this vulnerability fixed. 7. Use file integrity monitoring tools to detect unauthorized changes to critical system files promptly.
Affected Countries
United States, Germany, India, China, United Kingdom, Japan, South Korea, France, Canada, Australia
CVE-2026-26157: External Control of File Name or Path in Red Hat Red Hat Enterprise Linux 6
Description
A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26157 is a vulnerability identified in BusyBox, specifically within its archive extraction utilities used in Red Hat Enterprise Linux 6. The root cause is incomplete path sanitization during the extraction process, which allows an attacker to craft malicious archive files containing paths that traverse outside the intended extraction directory (e.g., via directory traversal sequences like '../'). When such an archive is extracted under specific conditions, it can overwrite arbitrary files on the filesystem. This arbitrary file overwrite can be leveraged to modify sensitive system files, potentially leading to privilege escalation or arbitrary code execution if critical binaries or configuration files are replaced or altered. The vulnerability requires local access with low privileges and user interaction to extract the malicious archive, which somewhat limits remote exploitation but still poses a significant risk in multi-user or shared environments. The CVSS 3.1 score of 7.0 reflects a high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the potential for damage is substantial, especially in environments where untrusted archives are handled. Red Hat Enterprise Linux 6, despite being an older release, remains in use in some legacy systems, making this vulnerability relevant for organizations maintaining such environments. The lack of patch links suggests that users should monitor Red Hat advisories closely for updates or consider upgrading to newer supported versions.
Potential Impact
The vulnerability allows attackers to overwrite arbitrary files on affected systems, which can compromise system integrity and confidentiality. By modifying critical system files or binaries, attackers may achieve arbitrary code execution, leading to full system compromise. This can disrupt availability if system files are corrupted or replaced with malicious versions. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where users can be tricked into extracting malicious archives, such as shared hosting, development environments, or multi-user systems. Organizations relying on RHEL 6 for critical infrastructure or legacy applications face increased risk of data breaches, service disruption, and unauthorized access. The potential impact extends to compliance violations and reputational damage if exploited.
Mitigation Recommendations
1. Apply official patches from Red Hat as soon as they become available to address the BusyBox archive extraction utilities vulnerability. 2. Until patches are applied, restrict the extraction of untrusted archives, especially those received from external or unverified sources. 3. Implement strict file system permissions and use sandboxing or containerization to limit the impact of archive extraction operations. 4. Educate users about the risks of extracting archives from untrusted sources and enforce policies to minimize user interaction with potentially malicious files. 5. Monitor system logs for unusual file modifications or extraction activities that could indicate exploitation attempts. 6. Consider upgrading from RHEL 6 to a more recent, supported version of Red Hat Enterprise Linux that includes updated BusyBox versions with this vulnerability fixed. 7. Use file integrity monitoring tools to detect unauthorized changes to critical system files promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-02-11T17:05:41.991Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698cea984b57a58fa1c97f49
Added to database: 2/11/2026, 8:46:16 PM
Last enriched: 2/26/2026, 3:29:09 PM
Last updated: 3/29/2026, 1:46:26 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.