CVE-2026-3888 (GCVE-0-2026-3888)

Vulnerability from cvelistv5 – Published: 2026-03-17 14:02 – Updated: 2026-03-18 08:59
VLAI?
Title
Local Privilege Escalation in snapd
Summary
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
CWE
Assigner
References
Impacted products
Vendor Product Version
Affected: 0 , < 2.75.1 (semver)
    Canonical Ubuntu 16.04 LTS Unaffected: 2.61.4ubuntu0.16.04.1+esm2 , < * (dpkg)
Create a notification for this product.
    Canonical Ubuntu 18.04 LTS Unaffected: 2.61.4ubuntu0.18.04.1+esm2 , < * (dpkg)
Create a notification for this product.
    Canonical Ubuntu 20.04 LTS Unaffected: 2.67.1+20.04ubuntu1~esm1 , < * (dpkg)
Create a notification for this product.
    Canonical Ubuntu 22.04 LTS Unaffected: 2.73+ubuntu22.04.1 , < * (dpkg)
Create a notification for this product.
    Canonical Ubuntu 24.04 LTS Unaffected: 2.73+ubuntu24.04.2 , < * (dpkg)
Create a notification for this product.
Date Public ?
2026-03-17 14:00
Credits
Qualys Security Advisory Team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-3888",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-17T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-18T03:55:45.787Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2026-03-18T03:02:10.640Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2026/03/18/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://github.com/canonical",
          "defaultStatus": "unaffected",
          "packageName": "snapd",
          "repo": "https://github.com/canonical/snapd/",
          "versions": [
            {
              "lessThan": "2.75.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://launchpad.net/ubuntu/xenial",
          "defaultStatus": "affected",
          "packageName": "snapd",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu 16.04 LTS",
          "repo": "https://launchpad.net/ubuntu/+source/snapd",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "2.61.4ubuntu0.16.04.1+esm2",
              "versionType": "dpkg"
            }
          ]
        },
        {
          "collectionURL": "https://launchpad.net/ubuntu/bionic",
          "defaultStatus": "affected",
          "packageName": "snapd",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu 18.04 LTS",
          "repo": "https://launchpad.net/ubuntu/+source/snapd",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "2.61.4ubuntu0.18.04.1+esm2",
              "versionType": "dpkg"
            }
          ]
        },
        {
          "collectionURL": "https://launchpad.net/ubuntu/focal",
          "defaultStatus": "affected",
          "packageName": "snapd",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu 20.04 LTS",
          "repo": "https://launchpad.net/ubuntu/+source/snapd",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "2.67.1+20.04ubuntu1~esm1",
              "versionType": "dpkg"
            }
          ]
        },
        {
          "collectionURL": "https://launchpad.net/ubuntu/jammy",
          "defaultStatus": "affected",
          "packageName": "snapd",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu 22.04 LTS",
          "repo": "https://launchpad.net/ubuntu/+source/snapd",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "2.73+ubuntu22.04.1",
              "versionType": "dpkg"
            }
          ]
        },
        {
          "collectionURL": "https://launchpad.net/ubuntu/noble",
          "defaultStatus": "affected",
          "packageName": "snapd",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu 24.04 LTS",
          "repo": "https://launchpad.net/ubuntu/+source/snapd",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "2.73+ubuntu24.04.2",
              "versionType": "dpkg"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Qualys Security Advisory Team"
        }
      ],
      "datePublic": "2026-03-17T14:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap\u0027s private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-268",
              "description": "CWE-268 Privilege chaining",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-18T08:59:07.522Z",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "issue-tracking"
          ],
          "url": "https://ubuntu.com/security/CVE-2026-3888"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://ubuntu.com/security/notices/USN-8102-1"
        },
        {
          "tags": [
            "technical-description",
            "vendor-advisory"
          ],
          "url": "https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888"
        },
        {
          "tags": [
            "technical-description",
            "media-coverage"
          ],
          "url": "https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root"
        },
        {
          "tags": [
            "technical-description",
            "media-coverage"
          ],
          "url": "https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Local Privilege Escalation in snapd"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2026-3888",
    "datePublished": "2026-03-17T14:02:08.475Z",
    "dateReserved": "2026-03-10T16:03:08.583Z",
    "dateUpdated": "2026-03-18T08:59:07.522Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-3888\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2026-03-17T14:16:17.410\",\"lastModified\":\"2026-03-18T04:17:30.720\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap\u0027s private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.\"},{\"lang\":\"es\",\"value\":\"La escalada de privilegios local en snapd en Linux permite a los atacantes locales obtener privilegios de root al recrear el directorio /tmp privado de snap cuando systemd-tmpfiles est\u00e1 configurado para limpiar autom\u00e1ticamente este directorio. Este problema afecta a Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS y 24.04 LTS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-268\"}]}],\"references\":[{\"url\":\"https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://ubuntu.com/security/CVE-2026-3888\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://ubuntu.com/security/notices/USN-8102-1\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/03/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/03/18/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-03-18T03:02:10.640Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-3888\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-17T14:50:38.432846Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-17T14:50:42.589Z\"}}], \"cna\": {\"title\": \"Local Privilege Escalation in snapd\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Qualys Security Advisory Team\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/canonical/snapd/\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.75.1\", \"versionType\": \"semver\"}], \"packageName\": \"snapd\", \"collectionURL\": \"https://github.com/canonical\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://launchpad.net/ubuntu/+source/snapd\", \"vendor\": \"Canonical\", \"product\": \"Ubuntu 16.04 LTS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2.61.4ubuntu0.16.04.1+esm2\", \"lessThan\": \"*\", \"versionType\": \"dpkg\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"collectionURL\": \"https://launchpad.net/ubuntu/xenial\", \"defaultStatus\": \"affected\"}, {\"repo\": \"https://launchpad.net/ubuntu/+source/snapd\", \"vendor\": \"Canonical\", \"product\": \"Ubuntu 18.04 LTS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2.61.4ubuntu0.18.04.1+esm2\", \"lessThan\": \"*\", \"versionType\": \"dpkg\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"collectionURL\": \"https://launchpad.net/ubuntu/bionic\", \"defaultStatus\": \"affected\"}, {\"repo\": \"https://launchpad.net/ubuntu/+source/snapd\", \"vendor\": \"Canonical\", \"product\": \"Ubuntu 20.04 LTS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2.67.1+20.04ubuntu1~esm1\", \"lessThan\": \"*\", \"versionType\": \"dpkg\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"collectionURL\": \"https://launchpad.net/ubuntu/focal\", \"defaultStatus\": \"affected\"}, {\"repo\": \"https://launchpad.net/ubuntu/+source/snapd\", \"vendor\": \"Canonical\", \"product\": \"Ubuntu 22.04 LTS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2.73+ubuntu22.04.1\", \"lessThan\": \"*\", \"versionType\": \"dpkg\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"collectionURL\": \"https://launchpad.net/ubuntu/jammy\", \"defaultStatus\": \"affected\"}, {\"repo\": \"https://launchpad.net/ubuntu/+source/snapd\", \"vendor\": \"Canonical\", \"product\": \"Ubuntu 24.04 LTS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2.73+ubuntu24.04.2\", \"lessThan\": \"*\", \"versionType\": \"dpkg\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"collectionURL\": \"https://launchpad.net/ubuntu/noble\", \"defaultStatus\": \"affected\"}], \"datePublic\": \"2026-03-17T14:00:00.000Z\", \"references\": [{\"url\": \"https://ubuntu.com/security/CVE-2026-3888\", \"tags\": [\"vdb-entry\", \"issue-tracking\"]}, {\"url\": \"https://ubuntu.com/security/notices/USN-8102-1\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888\", \"tags\": [\"technical-description\", \"vendor-advisory\"]}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root\", \"tags\": [\"technical-description\", \"media-coverage\"]}, {\"url\": \"https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt\", \"tags\": [\"technical-description\", \"media-coverage\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap\u0027s private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-268\", \"description\": \"CWE-268 Privilege chaining\"}]}], \"providerMetadata\": {\"orgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"shortName\": \"canonical\", \"dateUpdated\": \"2026-03-18T08:59:07.522Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-3888\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-18T08:59:07.522Z\", \"dateReserved\": \"2026-03-10T16:03:08.583Z\", \"assignerOrgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"datePublished\": \"2026-03-17T14:02:08.475Z\", \"assignerShortName\": \"canonical\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…