Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31979: CWE-59: Improper Link Resolution Before File Access ('Link Following') in himmelblau-idm himmelblau

0
High
VulnerabilityCVE-2026-31979cvecve-2026-31979cwe-59
Published: Wed Mar 11 2026 (03/11/2026, 19:47:05 UTC)
Source: CVE Database V5
Vendor/Project: himmelblau-idm
Product: himmelblau

Description

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:14:10 UTC

Technical Analysis

CVE-2026-31979 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the himmelblau interoperability suite, specifically the himmelblaud-tasks daemon. This daemon runs with root privileges and writes Kerberos credential cache files to /tmp/krb5cc_<uid> without implementing protections against symbolic link (symlink) attacks. The issue was introduced when the systemd PrivateTmp sandboxing feature was explicitly removed from the daemon's configuration, exposing the daemon's temporary file writes directly to the host's /tmp directory. As a result, a local attacker with access to the system can create malicious symlinks in /tmp that point to arbitrary files elsewhere on the system. When the daemon writes to these symlinked paths, it can overwrite or change ownership of critical files, enabling local privilege escalation to root. This vulnerability affects himmelblau versions from 1.0.0 up to but not including 2.3.8, and from 3.0.0-alpha up to but not including 3.1.0. The CVSS v3.1 score is 8.8, reflecting high severity due to the combination of local exploitability, low attack complexity, and the potential for complete system compromise. No known exploits in the wild have been reported yet. The vulnerability is mitigated by upgrading to versions 2.3.8 or 3.1.0 or later, which restore proper symlink protections and systemd sandboxing. The root cause is improper handling of temporary file creation and insufficient sandboxing, allowing link following attacks that compromise file system integrity and security.

Potential Impact

The impact of CVE-2026-31979 is significant for organizations using the himmelblau suite in environments where local user access is possible. Successful exploitation allows a local attacker to escalate privileges to root, leading to full system compromise. This includes unauthorized access to sensitive data, modification or deletion of critical files, and potential disruption of services dependent on himmelblau. Since the daemon handles Kerberos credential caches, compromise could also affect authentication and identity management processes, potentially cascading to broader network security issues. The vulnerability undermines confidentiality, integrity, and availability, making it a critical risk in multi-user or shared environments such as enterprise servers, cloud infrastructure, or managed service platforms. Organizations relying on himmelblau for Azure Entra ID and Intune interoperability must consider the risk of insider threats or compromised local accounts exploiting this flaw to gain elevated privileges and move laterally within their networks.

Mitigation Recommendations

To mitigate CVE-2026-31979, organizations should immediately upgrade himmelblau to version 2.3.8 or 3.1.0 and later, where the vulnerability is fixed by restoring PrivateTmp sandboxing and adding symlink protections. Until upgrades can be applied, restrict local user access to systems running the vulnerable daemon, especially limiting shell or file system access to untrusted users. Implement strict file system permissions on /tmp to prevent unauthorized symlink creation, and monitor /tmp for suspicious symlink activity. Employ host-based intrusion detection systems (HIDS) to detect attempts to exploit symlink vulnerabilities. Review systemd service configurations to ensure PrivateTmp or equivalent sandboxing features are enabled for critical daemons. Additionally, audit Kerberos cache file handling and consider isolating the daemon in containers or virtual machines with limited local user access. Regularly review and apply security patches from the vendor and maintain an inventory of affected versions to prioritize remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:40:10.487Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1c9b82f860ef9436f46ec

Added to database: 3/11/2026, 7:59:52 PM

Last enriched: 3/11/2026, 8:14:10 PM

Last updated: 3/11/2026, 11:33:59 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses