Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks

0
Medium
Exploitlinux
Published: Mon May 11 2026 (05/11/2026, 08:15:28 UTC)
Source: SecurityWeek

Description

Dirty Frag is a local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-43284 and CVE-2026-43500. It allows an unprivileged user to escalate permissions to root by chaining two flaws affecting the xfrm-ESP (IPsec) and RxRPC components. The vulnerability was disclosed before patches were available, and proof-of-concept code was released publicly. It is deterministic, does not rely on race conditions, and has a high success rate. Limited exploitation activity has been observed in the wild, including attempts to modify authentication files and disrupt PHP sessions. Linux distributions including Red Hat, Amazon Linux, Ubuntu, Fedora, and Alma Linux have started releasing patches and mitigations. The vulnerability may also enable container escape, though this has not been demonstrated. Microsoft Defender has detected limited activity potentially related to this exploit. The vulnerability is similar to previous Linux kernel flaws such as Dirty Pipe and Copy Fail.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/11/2026, 08:21:34 UTC

Technical Analysis

Dirty Frag (CVE-2026-43284 and CVE-2026-43500) is a local privilege escalation vulnerability in the Linux kernel that chains two flaws in the xfrm-ESP (IPsec) and RxRPC components. It allows an unprivileged user to gain root privileges without relying on timing or race conditions, making exploitation highly reliable. The vulnerability was disclosed prematurely before patches were available, leading to public release of technical details and proof-of-concept code. It primarily affects hosts not running container workloads but may also enable container escapes. Limited exploitation activity has been observed, including modification of authentication files and session disruption. Major Linux distributions have begun releasing patches and mitigations. The vulnerability is related to prior Linux kernel issues such as Dirty Pipe and Copy Fail, which have also been exploited in the wild.

Potential Impact

Successful exploitation of Dirty Frag allows an unprivileged local attacker to escalate privileges to root on affected Linux systems. This can lead to full system compromise, including modification of authentication files and disruption or access of active PHP sessions. The vulnerability may also enable container escape, increasing risk in containerized environments, although this has not yet been demonstrated. Limited exploitation activity has been observed in the wild, indicating active threat. The vulnerability affects major Linux distributions and could be leveraged after an attacker gains initial access via compromised accounts or other means.

Mitigation Recommendations

Linux distributions including Red Hat, Amazon Linux, Ubuntu, Fedora, and Alma Linux have started releasing patches and mitigations for Dirty Frag. Users and administrators should apply these official patches promptly to remediate the vulnerability. Since the vulnerability was disclosed before patches were available, immediate patching is critical. Microsoft Defender has detected limited exploitation attempts, so monitoring for related indicators may be useful. No vendor advisory states that no action is required or that the issue is already mitigated without patching. Patch status is confirmed as official fixes being released by major vendors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/new-dirty-frag-linux-vulnerability-possibly-exploited-in-attacks/","fetched":true,"fetchedAt":"2026-05-11T08:21:23.469Z","wordCount":1080}

Threat ID: 6a019183cbff5d8610cbe49a

Added to database: 5/11/2026, 8:21:23 AM

Last enriched: 5/11/2026, 8:21:34 AM

Last updated: 5/12/2026, 3:50:43 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses