Armis Logo< Back

CVE-2026-31431:

CVE-2026-31431 is a high-severity Linux kernel vulnerability in the `crypto: algif_aead` subsystem caused by incorrect in-place resource transfer between memory mappings, classified as CWE-669 (Incorrect Resource Transfer Between Spheres), which can be exploited by a local user to achieve full privilege escalation.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

7.8High
  • Published Date:Apr 22, 2026
  • CISA KEV Date:May 1, 2026
  • Industries Affected:20

Threat Predictions

  • EPSS Score:3.9
  • EPSS Percentile:88%

Exploitability

  • Score:1.8
  • Attack Vector:LOCAL
  • Attack Complexity:LOW
  • Privileges Required:LOW
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

CVE-2026-31431 is a high-severity Linux kernel vulnerability in the `crypto: algif_aead` subsystem caused by incorrect in-place resource transfer between memory mappings, classified as CWE-669 (Incorrect Resource Transfer Between Spheres), which can be exploited by a local user to achieve full privilege escalation.

Overview

CVE-2026-31431 is a HIGH severity (CVSS 3.1 score 7.8) local privilege escalation vulnerability in the Linux kernel's `crypto: algif_aead` subsystem. The flaw originates from commit `72548b093ee3`, which incorrectly implemented in-place AEAD cryptographic operations despite the source and destination buffers residing in distinct memory mappings. This incorrect resource transfer between spheres (CWE-669) enables a local attacker with low privileges to exploit the AF_ALG socket interface to perform unauthorized writes to kernel page cache memory, ultimately achieving full root access. The vulnerability has been actively exploited in the wild, as confirmed by its inclusion in the CISA Known Exploited Vulnerabilities catalog with a remediation due date of May 15, 2026. Public proof-of-concept exploits are available, including the "copy.fail" exploit and code published by Theori. The affected kernel version range spans 4.14 through 6.19.x, with broad impact across major Linux distributions.

Remediation

  • The Linux kernel maintainers have issued patches across all affected stable branches. Users and administrators should update to the following fixed kernel versions or later: 5.10.254, 5.15.204, 6.1.170, 6.6.137, 6.12.85, 6.18.22, or 6.19.12. Red Hat Enterprise Linux users should apply errata updates provided by Red Hat for RHEL 8, 9, and 10, and OpenShift Container Platform 4. Debian, Ubuntu, Amazon Linux, openSUSE, and SUSE Linux Enterprise users should apply the respective vendor-issued kernel security updates. As a temporary mitigation where patching is not immediately possible, restricting unprivileged access to AF_ALG sockets (e.g., via seccomp, LSM policies, or user namespace restrictions) may reduce the attack surface. CISA's BOD 22-01 guidance for cloud services should be followed where applicable. Organizations unable to apply mitigations should consider discontinuing use of affected kernel versions.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Medium
Manufacturing icon
Manufacturing
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Health Care and Social Assistance icon
Health Care and Social Assistance
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Wholesale Trade icon
Wholesale Trade
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!