Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3888: CWE-268 Privilege chaining

0
High
VulnerabilityCVE-2026-3888cvecve-2026-3888cwe-268
Published: Tue Mar 17 2026 (03/17/2026, 14:02:08 UTC)
Source: CVE Database V5

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

AI-Powered Analysis

AILast updated: 03/17/2026, 14:27:41 UTC

Technical Analysis

CVE-2026-3888 is a local privilege escalation vulnerability categorized under CWE-268 (Privilege Chaining) that affects the snapd service on Linux, specifically Ubuntu Long Term Support (LTS) versions 16.04, 18.04, 20.04, 22.04, and 24.04. Snapd manages snap packages and uses a private /tmp directory for its operations. When systemd-tmpfiles is configured to automatically clean this directory, a race condition or improper directory recreation can occur, allowing a local attacker to delete and then re-create the snap private /tmp directory with malicious permissions or content. This manipulation enables the attacker to escalate their privileges from a low-privileged local user to root, gaining full system control. The vulnerability requires local access and some complexity in exploitation (AC:H), but no user interaction is needed (UI:N). The scope is changed (S:C), meaning the exploit can affect resources beyond the initially compromised component. The CVSS 3.1 base score is 7.8, indicating a high severity due to the impact on confidentiality, integrity, and availability (all rated high). No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where local user access is possible. The vulnerability stems from the interaction between snapd's directory management and systemd-tmpfiles cleanup policies, highlighting the importance of secure temporary file handling and privilege separation in Linux services.

Potential Impact

The impact of CVE-2026-3888 is significant for organizations running affected Ubuntu LTS versions with snapd installed and systemd-tmpfiles configured to clean snap's private /tmp directory. Successful exploitation grants an attacker root privileges, enabling full control over the affected system. This can lead to unauthorized data access, system manipulation, installation of persistent malware, disruption of services, and lateral movement within networks. The vulnerability compromises confidentiality, integrity, and availability simultaneously. Organizations with multi-user environments, shared hosting, or developer workstations are at higher risk due to the requirement for local access. The ability to escalate privileges locally can bypass other security controls and lead to severe breaches. Although no known exploits are currently in the wild, the high severity and ease of local access exploitation make timely remediation critical to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2026-3888, organizations should: 1) Apply patches or updates from Ubuntu or snapd maintainers as soon as they become available, as no patch links are currently provided but are expected given the vulnerability's publication. 2) Review and modify systemd-tmpfiles configurations to prevent automatic cleanup of snap's private /tmp directory or restrict cleanup operations to trusted users only. 3) Implement strict local user permission controls to limit who can access and modify snap-related directories. 4) Monitor file system activities related to /tmp and snap directories for suspicious deletions or recreations. 5) Employ mandatory access controls (e.g., AppArmor, SELinux) to restrict snapd's ability to be manipulated by local users. 6) Limit local user access on critical systems and enforce strong authentication and session controls to reduce the risk of unauthorized local access. 7) Educate system administrators about the risks of privilege escalation via temporary file handling and encourage regular security audits of systemd-tmpfiles configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
canonical
Date Reserved
2026-03-10T16:03:08.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b96182771bdb1749b5a60b

Added to database: 3/17/2026, 2:13:22 PM

Last enriched: 3/17/2026, 2:27:41 PM

Last updated: 3/17/2026, 3:19:16 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses