github
WORKING POC
15 stars
by Sndav · pythonpoc
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
This repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the AF_ALG AEAD interface that allows unprivileged users to write arbitrary data to the page cache of readable files, bypassing file permissions and integrity checks. The exploit demonstrates local privilege escalation by modifying /etc/passwd to remove the root password.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG AEAD interface)
No auth needed
Prerequisites:
Linux kernel with CONFIG_CRYPTO_USER_API_AEAD enabled · Read access to the target file
github
WORKING POC
11 stars
by 0xShe · cpoc
https://github.com/0xShe/CVE-2026-31431
This repository contains a functional C-based exploit for CVE-2026-31431, a Linux kernel privilege escalation vulnerability in the AF_ALG interface. The exploit manipulates kernel memory via splice system calls to overwrite /bin/su with a malicious payload, granting root access.
Classification
Working Poc 95%
Target:
Linux kernel (early 5.x versions, e.g., Ubuntu 20.04 initial release)
No auth needed
Prerequisites:
Linux system with vulnerable kernel (5.x early versions) · Access to compile and execute the exploit binary
nomisec
WORKING POC
10 stars
by wgnet · poc
https://github.com/wgnet/wg.copyfail.patch
This repository provides two eBPF programs to mitigate CVE-2026-31431, a local privilege escalation vulnerability involving AF_ALG socket creation. The programs either filter or kill processes attempting to exploit the vulnerability, depending on kernel support for eBPF LSM.
Classification
Working Poc 95%
Target:
Linux Kernel (specific versions affected by CVE-2026-31431)
Auth required
Prerequisites:
eBPF support in kernel · clang, kernel-headers, libbpf-devel, bpftool · vmlinux.h from kernel headers
nomisec
WORKING POC
7 stars
by badsectorlabs · poc
https://github.com/badsectorlabs/copyfail-go
This repository contains a Go implementation of CVE-2026-31431, a Linux local privilege escalation (LPE) exploit targeting a vulnerability in the AF_ALG cryptographic socket interface. The exploit leverages a logic flaw to overwrite page cache contents, allowing arbitrary file modification and privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel (versions between August 2017 and April 2026)
No auth needed
Prerequisites:
Local code execution on a vulnerable Linux system · Access to the AF_ALG socket interface
github
SCANNER
5 stars
by kadir · pythonpoc
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
This repository provides a detection toolkit for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability. It includes tools for checking vulnerability exposure, detecting exploitation via auditd, eBPF, and page-cache comparison, and mitigating the risk.
Classification
Scanner 95%
Target:
Linux kernel
No auth needed
Prerequisites:
Access to the target system · Ability to run scripts with elevated privileges
github
WORKING POC
3 stars
by diemoeve · rustpoc
https://github.com/diemoeve/copyfail-rs
This repository contains a functional exploit PoC for CVE-2026-31431 (CopyFail), which allows unprivileged users to mutate files in the Linux page cache. It includes multiple exploit vectors (su, passwd, pam) and detection tools to identify tampering.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Ability to execute binaries
nomisec
WRITEUP
3 stars
by rfxn · poc
https://github.com/rfxn/copyfail
This repository provides a detailed technical analysis and mitigation strategies for CVE-2026-31431, a local privilege escalation vulnerability in the AF_ALG `authencesn` page-cache primitive. It includes a defense-in-depth approach with an LD_PRELOAD shim and a host auditor, but does not contain functional exploit code.
Classification
Writeup 95%
Target:
Linux Kernel (AF_ALG `authencesn`)
No auth needed
Prerequisites:
Access to AF_ALG socket · Presence of SUID binary or privileged config file
nomisec
WORKING POC
3 stars
by cozystack · poc
https://github.com/cozystack/copy-fail-blocker
This repository contains a BPF-LSM mitigation for CVE-2026-31431, a privilege escalation vulnerability in the Linux kernel crypto API (AF_ALG). The PoC blocks AF_ALG socket creation via a BPF program attached to the socket_create hook, preventing exploitation of the vulnerability.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG socket interface)
No auth needed
Prerequisites:
Kernel with CONFIG_BPF_LSM=y · BPF in active LSM stack · Privileged DaemonSet deployment
github
WORKING POC
3 stars
by desultory · pythonpoc
https://github.com/desultory/CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, demonstrating a cache poisoning vulnerability in the Linux kernel's AF_ALG socket interface. The exploit patches arbitrary files by manipulating the kernel's crypto API through crafted socket operations.
Classification
Working Poc 95%
Target:
Linux kernel (version not specified)
No auth needed
Prerequisites:
Access to the target system · Ability to create AF_ALG sockets
github
WORKING POC
3 stars
by Theori-lO · pythonpoc
https://github.com/Theori-lO/copy-fail-CVE-2026-31431
The exploit leverages a Linux kernel vulnerability (CVE-2026-31431) to achieve local privilege escalation by manipulating socket options and splicing file descriptors. It overwrites the `/usr/bin/su` binary with a malicious payload, then executes it to gain root access.
Classification
Working Poc 95%
Target:
Linux Kernel (versions 6.12.0-6.18.8)
No auth needed
Prerequisites:
Local access to the target system · Kernel version within the affected range
github
WORKING POC
2 stars
by SpenserCai · rustpoc
https://github.com/SpenserCai/copy_fail
This repository contains a functional Rust-based exploit for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` module. The exploit leverages a logic flaw to overwrite page cache contents of setuid binaries, granting root access. It also includes a defensive eBPF-based tool to block the exploit.
Classification
Working Poc 100%
Target:
Linux kernel (4.14 through 7.0-rc)
No auth needed
Prerequisites:
Vulnerable Linux kernel (4.14 to 7.0-rc) · Unprivileged local user access · Readable setuid binary (e.g., /usr/bin/su)
github
WORKING POC
2 stars
by shadowabi · pythonpoc
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
This repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the AF_ALG crypto subsystem that allows a 4-byte arbitrary write in the page cache, leading to local privilege escalation (LPE). The exploit dynamically calculates ELF entry point offsets to overwrite SUID binaries with shellcode, making it universally applicable across different kernel and binary versions.
Classification
Working Poc 100%
Target:
Linux kernel (AF_ALG crypto subsystem)
No auth needed
Prerequisites:
Linux kernel (any version since ~2017) · Python 3.10+ · Any SUID-root binary
github
SUSPICIOUS
2 stars
by lonelyor · poc
https://github.com/lonelyor/CVE-2026-31431-exp
The repository claims to be an exploit for CVE-2026-31431 but lacks actual exploit code, instead promoting external downloads and additional features like payload encryption and multi-architecture support without technical details.
Classification
Suspicious 90%
Target:
Linux kernel (2.6.38 - 6.18)
No auth needed
Prerequisites:
none specified
github
WORKING POC
2 stars
by iss4cf0ng · rustpoc
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
This repository contains a functional Rust-based exploit for CVE-2026-31431, a Linux kernel vulnerability in AF_ALG and splice() that allows local privilege escalation via arbitrary page cache writes. The exploit includes shellcode execution capabilities and supports custom payloads like Meterpreter.
Classification
Working Poc 95%
Target:
Linux kernel (multiple distributions)
No auth needed
Prerequisites:
Unprivileged local user access · algif_aead kernel module loaded
nomisec
WORKING POC
2 stars
by wuwu001 · poc
https://github.com/wuwu001/CVE-2026-31431-exploit
This repository contains functional exploit code for CVE-2026-31431, a Linux local privilege escalation (LPE) vulnerability. The exploit leverages an AF_ALG/splice page-cache overwrite primitive to modify runtime views of privileged files (e.g., `su`, PAM configurations) to gain root access. The code includes multiple modes for patching, reverting, and helper binary creation.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · local user access
github
WORKING POC
2 stars
by theori-io · pythonpoc
https://github.com/theori-io/copy-fail-CVE-2026-31431
The exploit leverages a Linux kernel vulnerability (CVE-2026-31431) to achieve local privilege escalation by manipulating socket options and splicing file descriptors. The PoC overwrites the `/usr/bin/su` binary with a malicious payload, then executes it to gain root access.
Classification
Working Poc 95%
Target:
Linux Kernel (versions 6.12.0-6.18.8)
No auth needed
Prerequisites:
Local access to the target system · Kernel version within the affected range
github
WORKING POC
1 stars
by ExploitEoom · poc
https://github.com/ExploitEoom/CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, demonstrating a local privilege escalation (LPE) vulnerability. The exploit includes binaries for verification and execution, along with detailed steps for usage and mitigation.
Classification
Working Poc 90%
Target:
Linux kernel (algif_aead module)
Auth required
Prerequisites:
Local access to the target system · Presence of the vulnerable algif_aead kernel module
github
WORKING POC
1 stars
by 1amBa7Man · pythonpoc
https://github.com/1amBa7Man/Linux-copy-fail-CVE-2026-31431
The repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability that allows local privilege escalation by manipulating the page cache of files. The exploit leverages the `AF_ALG` interface and `splice()` to inject data into the page cache of a target file, enabling execution of modified content in memory.
Classification
Working Poc 95%
Target:
Linux kernel (multiple distributions)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Unprivileged shell access
github
WORKING POC
1 stars
by ben-slates · pythonpoc
https://github.com/ben-slates/CVE-2026-31431-Exploit
The repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the `algif_aead` component that allows local privilege escalation via page-cache corruption. The exploit targets `/usr/bin/su` to gain root access.
Classification
Working Poc 95%
Target:
Linux kernel (versions with commit 72548b093ee3)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Python 3
gitlab
WORKING POC
1 stars
by KevinJClark · poc
https://gitlab.com/KevinJClark/copy-fail-cve-2026-31431
This repository contains a functional Python exploit for CVE-2026-31431, a Linux kernel vulnerability in AF_ALG/algif_aead that allows page-cache corruption. The toolkit includes detection, mitigation verification, and weaponization paths for privilege escalation (setuid binary patching and /etc/passwd UID manipulation).
Classification
Working Poc 100%
Target:
Linux kernel (v4.14 to v6.18, specific distros listed)
No auth needed
Prerequisites:
Access to AF_ALG sockets · Read access to target files (e.g., /usr/bin/su, /etc/passwd)
github
WORKING POC
1 stars
by povzayd · pythonpoc
https://github.com/povzayd/CVE-2026-31431
This repository contains a functional Python exploit for CVE-2026-31431, which leverages an AF_ALG kernel vulnerability to patch the 'su' binary in memory and escalate privileges. The exploit uses crafted socket operations and splice calls to modify executable memory.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions with AF_ALG vulnerability)
No auth needed
Prerequisites:
Vulnerable Linux kernel with AF_ALG interface · Presence of /usr/bin/su · AF_ALG and specific crypto algorithm availability
github
WORKING POC
1 stars
by ErdemOzgen · gopoc
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
This repository contains a Go-based PoC for CVE-2026-31431, a Linux kernel logic flaw in `authencesn` that enables a deterministic 4-byte write into page cache data via `AF_ALG` + `splice()`. The PoC is functional and includes build automation for multiple architectures.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions affected by CVE-2026-31431)
No auth needed
Prerequisites:
Unprivileged local user access · Linux kernel with vulnerable `authencesn` implementation
nomisec
WRITEUP
1 stars
by mahradbt · poc
https://github.com/mahradbt/copyfail-mitigation
This repository provides a detailed technical analysis and Ansible-based mitigation playbooks for CVE-2026-31431, a Linux kernel vulnerability in the `algif_aead` module. It includes audit and mitigation steps but does not contain functional exploit code.
Classification
Writeup 100%
Target:
Linux kernel (algif_aead module)
No auth needed
Prerequisites:
Ansible ≥ 2.14 · SSH access with sudo privileges · lsof installed on target hosts
github
WORKING POC
1 stars
by karollooool · pythonpoc
https://github.com/karollooool/Porting-CVE-2026-31431-Copy-Fail-to-a-Constrained-Java-Runner
This repository contains a functional exploit for CVE-2026-31431, adapted to work within a constrained Java environment. It leverages the AF_ALG socket interface to perform a page cache overwrite, achieving local privilege escalation (LPE) via a Java-based syscall layer and annotation processor trick.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG interface)
No auth needed
Prerequisites:
Java 21 with FFM API enabled · AF_ALG socket access · ability to compile Java code with annotation processors
github
WORKING POC
1 stars
by wvverez · pythonpoc
https://github.com/wvverez/CVE-2026-31431-Copy-Fail
This repository contains a functional local privilege escalation exploit for CVE-2026-31431, targeting a logic bug in the Linux kernel's `authencesn` cryptographic template. The exploit allows an unprivileged local user to perform a controlled 4-byte write into the page cache of any readable file, leading to full root compromise.
Classification
Working Poc 95%
Target:
Linux Kernel 6.12+
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Readable file in the target system
github
SCANNER
1 stars
by pcdoyle · gopoc
https://github.com/pcdoyle/copy-fail-cve-2026-31431
This repository contains a Go-based scanner for CVE-2026-31431, designed to detect vulnerability status across multiple Linux distributions. It checks kernel versions, module states, and changelogs without exploiting the vulnerability.
Classification
Scanner 95%
Target:
Linux kernel (specific version not explicitly stated)
No auth needed
Prerequisites:
Access to target system's kernel version, module state, and package changelogs
github
WRITEUP
1 stars
by Dabbleam · cpoc
https://github.com/Dabbleam/CVE-2026-31431-mitigation
This repository provides a mitigation for CVE-2026-31431 using eBPF (block_alg.bpf.c) and a userspace component (block_alg.c). It includes a Makefile for compilation and a GPLv2 license, but no exploit code or detailed vulnerability analysis.
Classification
Writeup 90%
Target:
Unknown (mitigation-focused)
No auth needed
Prerequisites:
Linux kernel with eBPF support · compilation tools
github
WORKING POC
1 stars
by Xerxes-2 · rustpoc
https://github.com/Xerxes-2/CVE-2026-31431-rs
This repository contains a functional Rust-based exploit for CVE-2026-31431, leveraging a race condition between AF_ALG sockets and splice syscalls to corrupt page cache and overwrite SUID binaries like /bin/su for local privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel (2017-2026, depending on distro patches)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · AF_ALG module loaded
github
WRITEUP
1 stars
by SunL0w · shellpoc
https://github.com/SunL0w/PATCH-CVE-2026-31431-Ubuntu_Debian
This repository provides a mitigation script for CVE-2026-31431, a Linux kernel vulnerability in the cryptographic subsystem (algif_aead module). It includes technical details on the vulnerability and scripts to block the vulnerable module.
Classification
Writeup 95%
Target:
Linux Kernel (Ubuntu Server 24.04 LTS)
Auth required
Prerequisites:
Ubuntu Server 24.04 LTS · Python3 for detection script
github
WORKING POC
1 stars
by wesmar · cpoc
https://github.com/wesmar/CVE-2026-31431
This repository contains a functional proof-of-concept exploit for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's AF_ALG cryptographic interface. The exploit leverages incorrect page cache handling during AEAD decryption to overwrite in-memory file content, granting an unprivileged user root access.
Classification
Working Poc 95%
Target:
Linux kernel (unpatched versions affected by CVE-2026-31431)
No auth needed
Prerequisites:
Unpatched Linux kernel vulnerable to CVE-2026-31431 · Local user access
github
WORKING POC
1 stars
by sammwyy · rustpoc
https://github.com/sammwyy/copyfail-rs
This repository contains a functional Rust implementation of the Copy Fail exploit (CVE-2026-31431), which chains AF_ALG and splice() syscalls to achieve a 4-byte page cache write, leading to local privilege escalation on vulnerable Linux kernels.
Classification
Working Poc 95%
Target:
Linux kernel (versions before April 2026 patch)
No auth needed
Prerequisites:
Vulnerable Linux kernel (pre-April 2026 patch) · Read permissions on target binary (e.g., /usr/bin/su)
github
WORKING POC
1 stars
by JuanBindez · pythonpoc
https://github.com/JuanBindez/CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the AF_ALG crypto subsystem. The exploit uses socket operations, splice(), and memory corruption to escalate privileges to root by injecting shellcode into the /usr/bin/su binary.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG subsystem)
No auth needed
Prerequisites:
Linux kernel with vulnerable AF_ALG implementation · Access to a user account on the target system
github
WORKING POC
1 stars
by yxdm02 · pythonpoc
https://github.com/yxdm02/CVE-2026-31431
The exploit leverages a Linux kernel vulnerability (CVE-2026-31431) to achieve local privilege escalation by manipulating socket options and splicing file descriptors to overwrite the `/usr/bin/su` binary with a malicious payload. The payload is embedded as a compressed hex string and decompressed at runtime.
Classification
Working Poc 90%
Target:
Linux Kernel 6.6.87.1-microsoft-standard-WSL2
No auth needed
Prerequisites:
Local access to the target system · Kernel version 6.6.87.1-microsoft-standard-WSL2
nomisec
WORKING POC
1 stars
by cs8425 · poc
https://github.com/cs8425/copy-fail-go
This repository contains a functional Go-based exploit for CVE-2026-31431, which leverages a memory corruption vulnerability in the Linux kernel's AF_ALG socket implementation to overwrite the `/usr/bin/su` binary with malicious shellcode, achieving local privilege escalation (LPE). The exploit demonstrates a reliable method to gain root access by corrupting page cache contents via crafted socket operations.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG socket implementation)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Ability to execute unprivileged code · Presence of `/usr/bin/su` binary
github
WRITEUP
1 stars
by XsanFlip · shellpoc
https://github.com/XsanFlip/CVE-2026-31431-Patch
This repository provides a detailed technical analysis and mitigation script for CVE-2026-31431, a local privilege escalation vulnerability in the Linux Kernel affecting versions 4.10 to 6.18.x. The script includes blacklisting vulnerable kernel modules, flushing the Page Cache, and updating the kernel to a patched version.
Classification
Writeup 90%
Target:
Linux Kernel (v4.10 up to v6.18.x)
No auth needed
Prerequisites:
root access to run the script · Debian/Kali-based system
nomisec
WRITEUP
1 stars
by yandex-cloud-examples · poc
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
This repository provides a detailed technical analysis and mitigation strategy for CVE-2026-31431, a Linux kernel vulnerability in the cryptographic API subsystem (AF_ALG) that allows local privilege escalation. It includes a DaemonSet for Yandex Managed Kubernetes to automatically block the vulnerable module.
Classification
Writeup 100%
Target:
Linux kernel (crypto/ AF_ALG subsystem)
No auth needed
Prerequisites:
local user access · AF_ALG AEAD interface availability
github
WORKING POC
1 stars
by bigwario · cpoc
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
This repository contains a functional exploit for CVE-2026-31431, leveraging a Linux kernel vulnerability in the AF_ALG socket interface. The exploit uses crafted messages and splice operations to achieve local privilege escalation (LPE) by manipulating kernel memory.
Classification
Working Poc 95%
Target:
Linux kernel (versions affected by CVE-2026-31431)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Compilation tools (gcc, zlib)
github
WORKING POC
1 stars
by novysodope · cpoc
https://github.com/novysodope/copy-fail-CVE-2026-31431-C
This repository contains a functional exploit for CVE-2026-31431, leveraging a vulnerability in the Linux kernel's AF_ALG socket implementation to achieve local privilege escalation (LPE). The exploit uses crafted messages and splice operations to trigger the vulnerability, ultimately executing `/usr/bin/su` to gain root access.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified, but tested on Ubuntu 24/25 and Kali 2026)
No auth needed
Prerequisites:
Access to a vulnerable Linux system with AF_ALG socket support · Ability to compile and execute the exploit binary
github
WORKING POC
1 stars
by Percivalll · gopoc
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
This repository contains a Go-based proof-of-concept exploit for CVE-2026-31431, targeting a Linux kernel vulnerability via the AF_ALG interface and splice(2) system calls. It includes static binaries for multiple architectures and embeds payloads for each target.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · AF_ALG interface support
github
WORKING POC
1 stars
by yiyihuohuo · pythonpoc
https://github.com/yiyihuohuo/CVE-2026-31431
The repository contains a functional Python exploit for CVE-2026-31431, which appears to leverage a socket-based vulnerability to achieve local privilege escalation (LPE) by manipulating file descriptors and socket options. The exploit decompresses and writes a payload to `/usr/bin/su`, suggesting an attempt to overwrite or modify system binaries for privilege escalation.
Classification
Working Poc 90%
Target:
Unknown (likely a Linux-based system with vulnerable socket handling)
No auth needed
Prerequisites:
Access to a vulnerable system with the ability to execute Python scripts · Kernel or system configuration allowing socket manipulation
nomisec
WORKING POC
1 stars
by tgies · poc
https://github.com/tgies/copy-fail-c
This repository contains a cross-platform C exploit for CVE-2026-31431, with build workflows for multiple architectures using both glibc and musl. The exploit is statically linked and includes payload handling, indicating a functional proof-of-concept.
Classification
Working Poc 95%
Target:
Unknown (CVE-2026-31431, likely a Linux kernel or userspace component)
No auth needed
Prerequisites:
Target architecture compatibility · Appropriate libc environment (glibc or musl)
github
SCANNER
by sebinxavi · shellpoc
https://github.com/sebinxavi/cve-checker-2026
This repository contains a multi-OS vulnerability scanner for CVE-2026-31431 (Linux kernel crypto/algif_aead flaw) and CVE-2026-41940 (cPanel & WHM authentication bypass). It checks for vulnerable configurations, patch status, and mitigation measures without exploiting the vulnerabilities.
Classification
Scanner 100%
Target:
Linux kernel (crypto/algif_aead), cPanel & WHM
No auth needed
Prerequisites:
access to the target system · root privileges for comprehensive checks
github
WORKING POC
by Lyutoon · cpoc
https://github.com/Lyutoon/CopyFail-Experiment
This repository contains a functional exploit for CVE-2026-31431, which leverages a splice-based arbitrary page-cache write vulnerability to achieve local privilege escalation by corrupting /usr/bin/su with shellcode.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Local access to the system · Presence of /usr/bin/su with SUID bit set
github
WORKING POC
by sercuritycyber · pythonpoc
https://github.com/sercuritycyber/COPY-FAIL-CVE-2026-31431
This repository contains a functional Python-based Proof-of-Concept (PoC) for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability. The exploit leverages the AF_ALG crypto API and splice() to corrupt the page cache of a setuid binary (e.g., /usr/bin/su), allowing unprivileged users to gain root access.
Classification
Working Poc 95%
Target:
Linux kernel (versions affected since ~2017)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Ability to execute Python code · Presence of a setuid binary like /usr/bin/su
github
WRITEUP
by mlazzarotto · poc
https://github.com/mlazzarotto/copy-fail-CVE-2026-31431-mitigation-ansible-playbook
This repository provides an Ansible playbook for mitigating CVE-2026-31431 by disabling the vulnerable `algif_aead` kernel module on Debian/Ubuntu and RHEL-based systems. It includes detailed documentation, usage instructions, and verification steps but does not contain exploit code.
Classification
Writeup 100%
Target:
Linux Kernel (AF_ALG module)
Auth required
Prerequisites:
Ansible 2.14+ · SSH access with sudo privileges · Target systems running Ubuntu/Debian or RHEL 9/10, Rocky Linux 9/10, AlmaLinux 9/10
github
WORKING POC
by Silent0x0 · pythonpoc
https://github.com/Silent0x0/Copy-Fail---CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, demonstrating a page-cache write vulnerability via AF_ALG+splice. It includes a canary test to verify vulnerability and a universal local privilege escalation (LPE) exploit that dynamically discovers and patches PAM functions in libpam to bypass authentication.
Classification
Working Poc 95%
Target:
Linux kernel (x86-64) with util-linux/shadow su
No auth needed
Prerequisites:
Linux kernel with AF_ALG support · util-linux/shadow su installed · Python 3
nomisec
WORKING POC
by Danford2017 · poc
https://github.com/Danford2017/Copy-Fail---CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, demonstrating a local privilege escalation (LPE) via arbitrary page-cache writes using AF_ALG and splice. The exploit dynamically discovers and patches PAM functions in libpam to bypass authentication checks.
Classification
Working Poc 95%
Target:
Linux kernel (util-linux/shadow su)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · AF_ALG support · util-linux/shadow su installed
nomisec
WORKING POC
by rvizx · poc
https://github.com/rvizx/CVE-2026-31431
This repository contains functional exploit code for CVE-2026-31431, a Linux kernel crypto subsystem vulnerability allowing local privilege escalation via AF_ALG and splice() manipulation. The PoC demonstrates a 4-byte write to the page cache of any readable file, leading to root access by corrupting a setuid binary.
Classification
Working Poc 100%
Target:
Linux kernel (6.8.0-1012-aws)
No auth needed
Prerequisites:
Unprivileged local user access · AF_ALG and authencesn module availability · Readable setuid binary (e.g., /usr/bin/su)
nomisec
WORKING POC
by atgreen · poc
https://github.com/atgreen/block-copyfail
This repository contains a functional BPF LSM-based mitigation for CVE-2026-31431, a Linux kernel privilege escalation vulnerability in the `authencesn` cryptographic template. The PoC blocks vulnerable AF_ALG socket binds using eBPF, compiled via Whistler (a Common Lisp eBPF compiler), and includes a test script to verify the blocker's functionality.
Classification
Working Poc 95%
Target:
Linux kernel (5.7+ with BPF LSM enabled)
No auth needed
Prerequisites:
Linux kernel 5.7+ with CONFIG_BPF_LSM=y and lsm=bpf boot parameter · SBCL 2.0+ · Whistler (Common Lisp eBPF compiler)
github
WRITEUP
by sbeteta42 · poc
https://github.com/sbeteta42/CVE-2026-31431_je_sappelle_RoOt
This repository provides a detailed technical analysis of CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's cryptographic subsystem (AF_ALG and algif_aead module). It includes root cause analysis, affected systems, and remediation guidance but does not contain exploit code.
Classification
Writeup 100%
Target:
Linux kernel (AF_ALG, algif_aead module)
Auth required
Prerequisites:
Local user access · Vulnerable kernel version
github
WORKING POC
by beatbeast007 · poc
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
This repository contains a C-based Linux local privilege escalation exploit for CVE-2026-31431, leveraging AF_ALG, authencesn, and splice primitives to overwrite the page cache of /usr/bin/su with setuid shellcode for root access.
Classification
Working Poc 90%
Target:
Linux Kernel (version not specified)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Kernel with AF_ALG and splice support
github
WORKING POC
by kvakirsanov · pythonpoc
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
This repository contains a functional proof-of-concept exploit for CVE-2026-31431, demonstrating arbitrary code execution in a running process via page cache manipulation using the 'Copy Fail' technique. The exploit compiles a test binary, injects shellcode to replace a function, and verifies execution by comparing the process PID.
Classification
Working Poc 95%
Target:
Linux kernel (unpatched, with algif_aead module)
No auth needed
Prerequisites:
Unpatched kernel with algif_aead module available · gcc · AF_ALG socket access
github
SUSPICIOUS
by RecoFu · poc
https://github.com/RecoFu/CVE-2026-31431-Copy-Fail
The repository claims to provide a local privilege escalation exploit for CVE-2026-31431 but contains no actual exploit code. It references external documents for technical details, mitigation, and detection, which are not included in the repository.
Classification
Suspicious 90%
Target:
Linux kernel (CONFIG_CRYPTO_USER_API_AEAD)
No auth needed
Prerequisites:
Unprivileged user access · Linux kernel with CONFIG_CRYPTO_USER_API_AEAD
github
WORKING POC
by FrosterDL · pythonpoc
https://github.com/FrosterDL/CVE-2026-31431
The repository contains a functional Python exploit for CVE-2026-31431, leveraging socket manipulation and file operations to achieve local privilege escalation (LPE) by overwriting the `/usr/bin/su` binary with a malicious payload.
Classification
Working Poc 90%
Target:
Linux-based systems (tested on Ubuntu 24.04)
No auth needed
Prerequisites:
Local access to the target system · Python 3 environment
github
SUSPICIOUS
by toxy4ny · poc
https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam
The repository contains only a vague README with buzzwords like 'Hardened AF_ALG/splice page-cache mutation primitive' but no actual exploit code, technical details, or proof-of-concept. It appears to be a placeholder or lure.
Classification
Suspicious 90%
Target:
unknown
No auth needed
github
WORKING POC
by MarioHY · pythonpoc
https://github.com/MarioHY/cve_2026_31431_audit
This repository contains a functional Python exploit for CVE-2026-31431, targeting a Linux kernel vulnerability via page cache hijacking to inject data into /etc/passwd for privilege escalation. The exploit includes detection, exploitation, and cleanup phases, with a menu-driven interface.
Classification
Working Poc 95%
Target:
Linux Kernel 5.10+
No auth needed
Prerequisites:
Linux kernel 5.10+ · AF_ALG socket support · Python 3.x
github
WORKING POC
by AliHzSec · pythonpoc
https://github.com/AliHzSec/CVE-2026-31431
The repository contains a functional Python-based exploit for CVE-2026-31431, demonstrating a local privilege escalation (LPE) vulnerability. The exploit manipulates socket options and file descriptors to achieve privilege escalation via the 'su' binary.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Local access to the target system · Python 3 environment
github
WORKING POC
by Fulucky0-yuri · cpoc
https://github.com/Fulucky0-yuri/CVE-2026-31431-PocC
This repository contains a functional C-based PoC for CVE-2026-31431, exploiting a Linux kernel AF_ALG subsystem page cache poisoning vulnerability to achieve local privilege escalation (LPE) by corrupting SUID file contents. The code includes a shellcode payload to spawn a shell and demonstrates the exploit chain via AF_ALG socket manipulation and splice system calls.
Classification
Working Poc 95%
Target:
Linux kernel 5.15 ~ 6.1.x (with CONFIG_CRYPTO_USER_API_AEAD)
Auth required
Prerequisites:
Kernel compiled with CONFIG_CRYPTO_USER_API_AEAD or AEAD modules loaded · Local low-privilege account with code execution capability · Filesystem supporting splice system calls · Presence of SUID binaries (e.g., /bin/su, /usr/bin/sudo)
github
STUB
by abhishekhargan · poc
https://github.com/abhishekhargan/CVE-2026-31431
The repository contains only a minimal README with a title and brief description of CVE-2026-31431, a Linux Kernel Local Privilege Escalation vulnerability, but no exploit code, technical details, or additional content.
Target:
Linux Kernel (version unspecified)
No auth needed
Prerequisites:
none specified
github
WORKING POC
by OmerAti · shellpoc
https://github.com/OmerAti/almalinux-fix-cve-2026-31431
This repository contains a functional script that automates the mitigation of CVE-2026-31431 by updating the kernel on AlmaLinux/CloudLinux systems and setting the patched version as default. The script handles package updates, repository management, and GRUB configuration.
Classification
Working Poc 90%
Target:
Linux kernel (AlmaLinux/CloudLinux/RHEL-based systems)
Auth required
Prerequisites:
root access · dnf package manager · AlmaLinux/CloudLinux/RHEL-based system
github
STUB
by HulnotHutu · poc
https://github.com/HulnotHutu/CVE-2026-31431
The repository contains only a README.md file with no actual exploit code or technical details. It appears to be a placeholder or incomplete submission.
Target:
unknown
No auth needed
nomisec
WRITEUP
by deckhouse · poc
https://github.com/deckhouse/d8-copy-fail-mitigation
This repository provides mitigation guidance and configuration files for CVE-2026-31431, a Linux kernel vulnerability in the `algif_aead` module. It includes detailed technical analysis, mitigation steps, and detection rules for Deckhouse Kubernetes Platform.
Classification
Writeup 100%
Target:
Linux kernel (algif_aead module)
No auth needed
Prerequisites:
Access to a system with the vulnerable `algif_aead` module loaded · Ability to create AF_ALG sockets
nomisec
WORKING POC
by cyber-joker · poc
https://github.com/cyber-joker/copy-fail-python
This repository contains a functional Python port of the CVE-2026-31431 exploit, which corrupts the page cache of the setuid `su` binary to achieve local privilege escalation (LPE). The exploit uses `os.splice` to overwrite the page cache with shellcode, then executes the corrupted `su` binary to gain root privileges.
Classification
Working Poc 95%
Target:
Linux systems with vulnerable kernel (CVE-2026-31431)
No auth needed
Prerequisites:
Linux system with Python 3.10+ · Vulnerable kernel version · Access to the `su` binary
nomisec
WRITEUP
by aestechno · poc
https://github.com/aestechno/cve-2026-31431-ansible
This repository provides an Ansible playbook to detect and mitigate CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` AF_ALG interface. The mitigation involves appending `initcall_blacklist=algif_aead_init` to the kernel command line to prevent exploitation.
Classification
Writeup 95%
Target:
Linux kernel (affecting distributions since 2017)
No auth needed
Prerequisites:
Local access to a vulnerable system · Ability to modify kernel command line (root access required for mitigation)
nomisec
WORKING POC
by johanburati · poc
https://github.com/johanburati/CVE-2026-31431
This repository contains a functional exploit PoC for CVE-2026-31431, a Linux kernel AF_ALG AEAD use-after-free vulnerability. The code demonstrates the vulnerability by interacting with the AF_ALG interface and triggering the bug through crafted control messages.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG AEAD interface)
No auth needed
Prerequisites:
AF_ALG interface enabled · AEAD cipher support
nomisec
WORKING POC
by 3jee · poc
https://github.com/3jee/copy-fail-go
This repository contains a Go-based exploit for CVE-2026-31431 (Copy.Fail), a Linux kernel vulnerability in the `algif_aead` crypto module. The exploit allows unprivileged users to gain root access by manipulating the page cache of SUID binaries without modifying the underlying files.
Classification
Working Poc 95%
Target:
Linux kernel (versions affected since 2017)
No auth needed
Prerequisites:
Linux kernel in affected version range · SUID world-readable binary present on the target
nomisec
WORKING POC
by LeonardoNovais7 · poc
https://github.com/LeonardoNovais7/Copy-Fail-Exploit-CVE-2026-31431
The repository contains functional exploit code for CVE-2026-31431, demonstrating a local privilege escalation (LPE) via a flaw in the Linux AF_ALG socket interface. Both C and Python versions are provided, leveraging improper handling of cryptographic operations to escalate privileges to root.
Classification
Working Poc 90%
Target:
Linux Kernel (AF_ALG socket interface)
Auth required
Prerequisites:
Local access to the target system · Ability to execute code as a non-root user
nomisec
WRITEUP
by bryanvine · poc
https://github.com/bryanvine/copy-fail-fix
This repository provides per-distro mitigation scripts for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability in the `algif_aead` module. It includes detailed technical analysis, patch status tracking, and scripts to blacklist the vulnerable module or install patched kernels.
Classification
Writeup 100%
Target:
Linux kernel (algif_aead module)
No auth needed
Prerequisites:
Local access to the target system · Vulnerable kernel version
nomisec
WRITEUP
by boliu83 · poc
https://github.com/boliu83/cve-2026-31431-algif-aead-remediator
This repository provides a Kubernetes DaemonSet to mitigate CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` module. It includes detailed documentation, YAML manifests for deployment, and a script to blacklist the vulnerable module and label nodes based on their mitigation status.
Classification
Writeup 100%
Target:
Linux kernel (algif_aead module)
No auth needed
Prerequisites:
Kubernetes cluster with cluster-admin permissions · kubectl configured against the target cluster
github
WORKING POC
by sngrotesque · pythonpoc
https://github.com/sngrotesque/CVE-2026-31431
The repository contains a functional exploit for CVE-2026-31431, utilizing obfuscated Python code with ChaCha20 decryption to execute a payload. The exploit establishes a socket connection, sends crafted messages, and likely achieves remote code execution.
Classification
Working Poc 90%
Target:
Unknown (obfuscated payload)
No auth needed
Prerequisites:
Network access to target · Python environment with Crypto library
github
WORKING POC
by offsecguy · cpoc
https://github.com/offsecguy/CVE-2026-31431
This repository contains a functional C exploit for CVE-2026-31431, leveraging the Linux kernel crypto API (AF_ALG) with AEAD mode, MSG_MORE flag, and splice system call to achieve privilege escalation by processing data from a read-only file descriptor.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux kernel with AF_ALG support · zlib for decompression
github
WORKING POC
by poyea · cpoc
https://github.com/poyea/CVE-2026-31431.c
This repository contains a functional exploit for CVE-2026-31431, targeting a vulnerability in the Linux kernel's AF_ALG socket implementation. The exploit uses crafted control messages and splice operations to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · AF_ALG socket support · zlib for shellcode decompression
github
WORKING POC
by maniakh · pythonpoc
https://github.com/maniakh/CVE-2026-31431---Copy-Fail-PoC
The repository contains a functional Python exploit for CVE-2026-31431, targeting a Linux kernel vulnerability involving page cache manipulation to achieve local privilege escalation (LPE). The exploit uses socket manipulation and file operations to overwrite the `/usr/bin/su` binary with a malicious payload.
Classification
Working Poc 90%
Target:
Linux Kernel (version not specified)
No auth needed
Prerequisites:
Local access to the vulnerable system · Python 3 environment
nomisec
WRITEUP
by mym0us3r · poc
https://github.com/mym0us3r/COPY-FAIL-Detection-with-Wazuh-4.14.4
This repository provides a detailed technical analysis and detection rules for CVE-2026-31431, a Linux kernel vulnerability in the 'authencesn' cryptographic template. It includes Wazuh rules and auditd configurations to detect the exploit chain, which involves a 4-byte write into the page cache of readable files.
Classification
Writeup 100%
Target:
Linux kernel (versions since commit 72548b093ee3)
No auth needed
Prerequisites:
Local access to the system · Unprivileged user account
nomisec
WORKING POC
by meowteusz · poc
https://github.com/meowteusz/copyfailautopatch
This repository contains a functional exploit PoC for CVE-2026-31431, a Linux kernel vulnerability in the AF_ALG socket family that allows a page-cache write primitive. The script detects the vulnerability and optionally applies a mitigation by blacklisting the algif_aead module.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux host · Python 3.10+ · AF_ALG socket family support
github
WORKING POC
by DENNISDGR · pythonpoc
https://github.com/DENNISDGR/CVE-2026-31431-poc
This repository contains a functional exploit for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability in the AF_ALG/crypto API. The PoC patches /usr/bin/su in memory to execute arbitrary commands as root.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions with AF_ALG/crypto API vulnerability)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · AF_ALG and algif_aead support · Readable SUID binary (e.g., /usr/bin/su)
github
WORKING POC
by mishl-dev · cpoc
https://github.com/mishl-dev/CVE_2026_31431
The repository contains a functional exploit for CVE-2026-31431, a 4-byte page-cache write primitive in the Linux kernel's `authencesn` AEAD template. The exploit leverages `AF_ALG` and `splice()` to achieve local privilege escalation or container escape by overwriting specific bytes in the page cache of readable files.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions affected by CVE-2026-31431)
No auth needed
Prerequisites:
Unprivileged local user access · Readable target file (e.g., /etc/passwd)
github
WORKING POC
by B1gN0Se · cpoc
https://github.com/B1gN0Se/copy-fail-CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, targeting a vulnerability in the Linux kernel's AF_ALG socket implementation. The exploit manipulates control messages and splicing operations to patch the `/usr/bin/su` binary, achieving local privilege escalation (LPE).
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG socket implementation)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Ability to compile and execute the exploit
github
SCANNER
by liamromanis101 · pythonpoc
https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script
This repository contains a Python-based vulnerability detection script for CVE-2026-31431, a local privilege escalation flaw in the Linux kernel's AF_ALG crypto subsystem. The script checks for exploitable conditions but does not include exploit code.
Classification
Scanner 100%
Target:
Linux kernel (versions 4.10–6.14)
No auth needed
Prerequisites:
Unprivileged local access · Vulnerable kernel version · Loadable algif_aead module
github
WORKING POC
by Juguitos · pythonpoc
https://github.com/Juguitos/copy-fail
This repository contains a functional Python PoC for CVE-2026-31431, which exploits a vulnerability in the Linux kernel's `AF_ALG` interface to manipulate the page cache of SUID binaries and achieve local privilege escalation. The script includes payloads for multiple architectures and performs runtime checks for compatibility.
Classification
Working Poc 95%
Target:
Linux kernel (versions supporting AF_ALG and algif_aead)
No auth needed
Prerequisites:
Linux system with AF_ALG and algif_aead support · Python 3.10 or newer · Local access to the target system · Readable SUID binary (default: /usr/bin/su)
github
WORKING POC
by yuspring · pythonpoc
https://github.com/yuspring/cve-2026-31431-poc
This repository contains a functional exploit for CVE-2026-31431, which leverages a flaw in the Linux kernel's authencesn length validation to write dirty pages back to unauthorized locations, achieving privilege escalation by modifying /etc/passwd to remove the root password.
Classification
Working Poc 95%
Target:
Linux kernel (likely versions prior to 6.12.85)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Ability to execute the Python script
nomisec
WRITEUP
by devstuff · poc
https://github.com/devstuff/harden-docker-seccomp
This repository provides a mitigation tool and technical analysis for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `authencesn` cryptographic template. It includes a script to block `AF_ALG` socket creation via seccomp for Docker containers and Kubernetes pods, along with detailed technical background and mitigation steps.
Classification
Writeup 100%
Target:
Linux kernel (versions with `authencesn` cryptographic template, pre-fix)
No auth needed
Prerequisites:
Unpatched Linux kernel with `authencesn` vulnerability · Docker Engine or Kubernetes environment
github
WORKING POC
by websecnl · pythonpoc
https://github.com/websecnl/CVE-2026-31431
This repository contains a functional proof-of-concept exploit for CVE-2026-31431, a Linux kernel vulnerability in the algif_aead module that allows local privilege escalation via a controlled 4-byte write into the page cache of any readable file. The exploit leverages the authencesn AEAD template to perform the write, targeting /etc/passwd to escalate privileges.
Classification
Working Poc 95%
Target:
Linux kernel (algif_aead module)
No auth needed
Prerequisites:
Local access to the vulnerable system · Readable target file (e.g., /etc/passwd) · AF_ALG socket access
github
SUSPICIOUS
by rshosting · shellpoc
https://github.com/rshosting/CVE-2026-31431-patch
The repository claims to provide a mitigation for CVE-2026-31431 but lacks actual exploit code. It directs users to download and run an external Python script from a different GitHub repository, which is a common tactic for distributing malware or fake exploits.
Classification
Suspicious 90%
Target:
Linux kernel (AEAD vulnerability)
Auth required
Prerequisites:
Access to the target system · Root privileges to modify kernel parameters
nomisec
WORKING POC
by ShorterKing · poc
https://github.com/ShorterKing/Copyfail-rust
This repository contains a Rust-based PoC exploit for CVE-2026-31431, leveraging the AF_ALG socket family and splice() system calls to overwrite read-only files in the page cache, specifically targeting the 'su' binary for privilege escalation. The exploit includes multi-architecture support and demonstrates a clear understanding of the vulnerability mechanics.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Rust toolchain · Vulnerable Linux kernel
github
WORKING POC
by SeanRickerd · pythonpoc
https://github.com/SeanRickerd/cve-2026-31431
This repository contains a functional privilege escalation exploit for CVE-2026-31431, targeting a Linux kernel vulnerability in the authencesn AEAD implementation. The exploit manipulates the page cache to modify setuid binaries, granting root access, and includes detailed technical documentation and attack chain analysis for OpenShift environments.
Classification
Working Poc 95%
Target:
Linux kernel with authencesn support (2017-2026)
No auth needed
Prerequisites:
Linux kernel with vulnerable authencesn implementation · Python 3.9+ · Unprivileged user access · Readable setuid binary
github
SCANNER
by sec17br · shellpoc
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
The repository contains a Bash script to detect and mitigate CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` module. It checks for module presence, load status, and system patch state, and can apply a mitigation by blocking the module.
Classification
Scanner 100%
Target:
Linux kernel (Ubuntu, specifically)
No auth needed
Prerequisites:
Local access to the target system · Bash environment
nomisec
WORKING POC
by weirdindiankid · poc
https://github.com/weirdindiankid/copy-fail
The repository contains functional exploit code for CVE-2026-31431, demonstrating a local privilege escalation (LPE) vulnerability. The exploit manipulates socket options and file descriptors to overwrite the `/usr/bin/su` binary, elevating privileges to root.
Classification
Working Poc 90%
Target:
Linux kernel (unspecified version)
No auth needed
Prerequisites:
Local user access · Python environment
github
WORKING POC
by MohamedKarrab · pythonpoc
https://github.com/MohamedKarrab/Copy-Fail-CVE-2026-31431
This repository contains a functional proof-of-concept exploit for CVE-2026-31431, a Linux kernel vulnerability affecting AF_ALG AEAD implementation. The exploit corrupts the in-memory .text section of setuid-root binaries (e.g., /usr/bin/su) to achieve local privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel versions 4.14 and newer
No auth needed
Prerequisites:
Unpatched Linux kernel (4.14+) · Access to AF_ALG sockets · Presence of setuid-root binary
nomisec
WORKING POC
by mhdgning131 · poc
https://github.com/mhdgning131/CopyFail-Patcher
This repository provides functional bash scripts to mitigate CVE-2026-31431 by disabling the vulnerable 'algif_aead' kernel module via modprobe configuration and initramfs updates. It includes both patching and removal scripts with detailed logging and status checks.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
root/sudo access · Linux system with 'algif_aead' module
github
WORKING POC
by abdullaabdullazade · shellpoc
https://github.com/abdullaabdullazade/CVE-2026-31431
The repository contains a functional exploit for CVE-2026-31431, a logic vulnerability in the Linux kernel's `authencesn` cryptographic template. The exploit leverages AF_ALG sockets and `splice()` to perform a controlled 4-byte write into the page cache of setuid binaries, enabling local privilege escalation to root.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions not specified)
No auth needed
Prerequisites:
Unprivileged local access · AF_ALG socket support · Target setuid binary (e.g., /usr/bin/su)
github
WORKING POC
by w3llr00t3d · pythonpoc
https://github.com/w3llr00t3d/CVE-2026-31431-PoC
This repository contains a functional Python 3.9-compatible PoC for CVE-2026-31431, a Linux kernel vulnerability in the AF_ALG interface allowing controlled 4-byte writes to the page cache. The exploit uses a ctypes-based splice polyfill and targets /usr/bin/su for privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG interface)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Python 3.9 environment
github
STUB
by vynazevedo · poc
https://github.com/vynazevedo/fail-CVE-2026-31431
The repository contains only an empty README.md file with no exploit code, technical details, or meaningful content. It appears to be a placeholder or stub repository.
Target:
unknown
No auth needed
github
WORKING POC
by galoryber · pythonpoc
https://github.com/galoryber/CVE-2026-31431-cleaned
This repository contains a functional local privilege escalation exploit for CVE-2026-31431, leveraging a Linux kernel vulnerability in the splice() system call to corrupt kernel memory and overwrite setuid binaries.
Classification
Working Poc 95%
Target:
Linux kernel (version not specified)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Ability to execute Python scripts
github
SCANNER
by leelong2020 · shellpoc
https://github.com/leelong2020/cve-2026-31431
This repository contains a detection script for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability. The script checks for vulnerable configurations, loaded modules, and mitigation status but does not include exploit code.
Classification
Scanner 95%
Target:
Linux Kernel (specific versions not specified)
No auth needed
Prerequisites:
CONFIG_CRYPTO_USER_API_AEAD enabled · algif_aead module loaded or loadable
github
WRITEUP
by scriptzteam · shellpoc
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
This repository provides a hardening script to mitigate CVE-2026-31431 by blocking AF_ALG kernel crypto interfaces. It includes a technical explanation of the mitigation approach and a functional script to disable vulnerable modules.
Classification
Writeup 90%
Target:
Linux kernel (AF_ALG crypto interfaces)
Auth required
Prerequisites:
root access to modify kernel module configuration
nomisec
SCANNER
by professional-slacker · poc
https://github.com/professional-slacker/alg_check
This repository provides a diagnostic toolkit for detecting and mitigating CVE-2026-31431, a local privilege escalation vulnerability in the Linux Kernel Crypto API (AF_ALG). It includes scripts to audit system security posture, disable AF_ALG modules, and restore them, but does not contain functional exploit code.
Classification
Scanner 95%
Target:
Linux Kernel (AF_ALG)
No auth needed
Prerequisites:
Access to a vulnerable Linux system with AF_ALG enabled
github
WORKING POC
by grishinpv · pythonpoc
https://github.com/grishinpv/CVE-2026-31431-old-python
This repository contains a functional exploit for CVE-2026-31431, leveraging a Python ctypes wrapper for `os.splice` to achieve remote code execution (RCE) on systems running Python versions below 3.10. The exploit uses socket manipulation and file descriptor splicing to execute arbitrary commands, specifically targeting `/usr/bin/su`.
Classification
Working Poc 95%
Target:
Python < 3.10
No auth needed
Prerequisites:
Python < 3.10 · Access to `libc.so.6` · Network connectivity for socket operations
nomisec
WORKING POC
by eximiait · poc
https://github.com/eximiait/CVE-2026-31431
This repository contains a functional exploit PoC for CVE-2026-31431, targeting a Linux kernel vulnerability in the AF_ALG interface (algif_aead). It includes Ansible playbooks and scripts to check for vulnerability, apply mitigation, and revert changes.
Classification
Working Poc 90%
Target:
Linux Kernel (AF_ALG interface, algif_aead module)
Auth required
Prerequisites:
Access to a vulnerable Linux system with the algif_aead module loaded · Python3 and Ansible installed
nomisec
WORKING POC
by Boos4721 · poc
https://github.com/Boos4721/copyfail-rs
This repository contains a functional Rust implementation of CVE-2026-31431, a Linux kernel vulnerability allowing unprivileged users to write arbitrary data into the page cache of readable files via AF_ALG splice. The exploit includes multiple privilege escalation modes, such as modifying /etc/passwd or overwriting the su binary with shellcode.
Classification
Working Poc 95%
Target:
Linux kernel < 6.12.23, < 6.13.11, < 6.14.2
No auth needed
Prerequisites:
Unprivileged user access · Readable target file in page cache · AF_ALG splice support in kernel
nomisec
WORKING POC
by attaattaatta · poc
https://github.com/attaattaatta/CVE-2026-31431
This repository contains a Go-based hotfix for CVE-2026-31431, which mitigates a vulnerability by unloading the 'algif_aead' kernel module and preventing its reloading. The code checks for vulnerability status and applies the fix if root privileges are available.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
root privileges · presence of 'algif_aead' kernel module
github
SCANNER
by dicatalin · pythonpoc
https://github.com/dicatalin/Copy_Fail_CVE-2026-31431_test_and_fix
The repository contains a Python script that checks for the presence of a vulnerable kernel module (algif_aead) by attempting to create a socket of type AF_ALG. It does not exploit the vulnerability but detects whether the system is vulnerable to CVE-2026-31431.
Classification
Scanner 90%
Target:
Linux Kernel (specific versions not specified)
No auth needed
Prerequisites:
Access to a system with the algif_aead kernel module loaded
github
WORKING POC
by mfloresdacunha · pythonpoc
https://github.com/mfloresdacunha/CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` subsystem. The exploit manipulates the kernel page cache to overwrite arbitrary bytes in world-readable files, specifically targeting `/etc/passwd` to escalate privileges to root.
Classification
Working Poc 100%
Target:
Linux kernel 6.12–6.18 (unpatched)
No auth needed
Prerequisites:
AF_ALG socket support · authencesn(hmac(sha256),cbc(aes)) cipher · Python 3.6+ · 4-digit UID (1000–9999) · password set on the user account
github
WRITEUP
by Linux-zs · cpoc
https://github.com/Linux-zs/cve-2026-31431-mitigation
This repository provides a detailed technical analysis and mitigation strategy for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` / `authencesn` crypto subsystem. It includes a PAM module and standalone binary to apply seccomp filters, blocking the vulnerable `socket(AF_ALG, ...)` syscall.
Classification
Writeup 100%
Target:
Linux kernel (6.12+, 6.17+, 6.18+, RHEL/CentOS 4.18)
Auth required
Prerequisites:
Linux kernel with seccomp support · gcc · libpam · root/sudo access · x86_64 architecture
github
WRITEUP
by jmac774 · poc
https://github.com/jmac774/CVE-2026-31431-mitigation-rhel
This repository provides a mitigation technique for CVE-2026-31431 on RHEL systems by disabling the AEAD subsystem via kernel boot parameters. It explains how to modify GRUB configurations to prevent the exploit from functioning by making the AEAD socket unavailable.
Classification
Writeup 90%
Target:
Red Hat Enterprise Linux (RHEL) kernel
Auth required
Prerequisites:
Administrative access to modify GRUB configurations · Reboot required to apply changes
github
SCANNER
by TikoTikTok · shellpoc
https://github.com/TikoTikTok/copy-fail-cve-2026-31431
This repository provides passive detection scripts and technical documentation for CVE-2026-31431, a Linux LPE and container-escape vulnerability. It includes tools to check for vulnerable kernel versions, module states, and configurations without executing exploit code.
Classification
Scanner 100%
Target:
Linux kernel (4.11 to patched versions)
No auth needed
Prerequisites:
Access to target system for passive checks
github
WORKING POC
by gmeghnag · dockerfilepoc
https://github.com/gmeghnag/TEST-CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, demonstrating a privilege escalation vulnerability in a containerized environment. The exploit leverages a Python script fetched from an external URL to escalate from a non-root user (UID 1001) to root.
Classification
Working Poc 90%
Target:
Unknown (likely a containerized application or Red Hat UBI-based system)
No auth needed
Prerequisites:
Access to a vulnerable containerized environment · Network access to fetch the exploit script from 'https://copy.fail/exp'
github
WRITEUP
by slauger · poc
https://github.com/slauger/CVE-2026-31431
This repository provides a detailed technical analysis of CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's `algif_aead` subsystem. It includes impact analysis, mitigation strategies, and test scripts to verify exploit prerequisites.
Classification
Writeup 100%
Target:
Linux Kernel (all mainstream versions since 2017)
No auth needed
Prerequisites:
AF_ALG socket access · presence of setuid binary
github
SCANNER
by Webhosting4U · shellpoc
https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431
This repository provides a Bash script to detect and mitigate exposure to CVE-2026-31431 (Copy Fail) by checking kernel patch status, module availability, and applying a host-level mitigation via modprobe configuration. It does not contain exploit code but helps identify vulnerable systems.
Classification
Scanner 95%
Target:
Linux kernel (specific versions affected by CVE-2026-31431)
Auth required
Prerequisites:
root privileges · Linux host · common system tools (uname, modinfo, lsmod, ss, grep)
github
WORKING POC
by rio128128 · pythonpoc
https://github.com/rio128128/copy-fail-CVE-2026-31431
The repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the `authencesn` cryptographic template that allows an unprivileged local user to perform a controlled 4-byte write into the page cache of any readable file, leading to local privilege escalation (LPE). The exploit is a 732-byte Python script that leverages `AF_ALG` sockets and `splice()` to corrupt the page cache of setuid binaries, achieving root access.
Classification
Working Poc 100%
Target:
Linux kernel (versions 6.12.0 to 6.18.8, among others)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Python 3.10+ for `os.splice` support
github
WRITEUP
by amdisrar · poc
https://github.com/amdisrar/cve-2026-31431-mitigation
This repository provides a mitigation script and technical details for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability in the AF_ALG crypto interface. It includes scripts to unload vulnerable kernel modules and block exploit paths, along with verification and revert steps.
Classification
Writeup 90%
Target:
Linux kernel (AF_ALG crypto interface)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Kernel modules af_alg and algif_aead loaded
github
WORKING POC
by 0xBlackash · shellpoc
https://github.com/0xBlackash/CVE-2026-31431
The repository contains a functional Python exploit for CVE-2026-31431, a local privilege escalation vulnerability in the Linux kernel's cryptographic subsystem (algif_aead). The exploit leverages a controlled 4-byte write into the page cache of setuid binaries to achieve root access.
Classification
Working Poc 95%
Target:
Linux kernel (versions from 2017 to early 2026)
No auth needed
Prerequisites:
Unpatched Linux kernel · Unprivileged local user access
github
WORKING POC
by G01d3nW01f · rustpoc
https://github.com/G01d3nW01f/CVE-2026-31431
This repository contains a functional Rust-based PoC for CVE-2026-31431, a local privilege escalation (LPE) vulnerability. It exploits the Linux kernel's Crypto API and `splice` system call to manipulate the page cache, overwriting the UID field in `/etc/passwd` to escalate privileges.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions vulnerable to Crypto API behavior)
No auth needed
Prerequisites:
Linux system vulnerable to the Crypto API behavior · Rust toolchain · libc and nix dependencies
nomisec
WORKING POC
by H1d3r · poc
https://github.com/H1d3r/copy-fail_LPE_Interactive
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2026-31431, a Linux kernel page cache pollution vulnerability in the `authencesn` AEAD algorithm. The exploit leverages `AF_ALG` and `splice()` system calls to write 4 bytes to arbitrary readable file page caches, enabling privilege escalation via setuid binaries like `/usr/bin/su`.
Classification
Working Poc 95%
Target:
Linux kernel 4.14+ (up to 2026-04)
No auth needed
Prerequisites:
Linux kernel 4.14+ · access to a setuid binary (e.g., /usr/bin/su) · ability to compile and execute binary
nomisec
SCANNER
by Phalanx-CCS · poc
https://github.com/Phalanx-CCS/Copy-Fail
This repository contains a Python script that checks for the presence of the vulnerable `algif_aead` module in the Linux kernel, which is associated with CVE-2026-31431. The script does not exploit the vulnerability but passively detects whether the attack surface is reachable.
Classification
Scanner 100%
Target:
Linux kernel (4.14 and later)
No auth needed
Prerequisites:
Linux system with Python 3 · Unpatched kernel (4.14 or later)
github
WORKING POC
by dorianhhuc · poc
https://github.com/dorianhhuc/CVE-2026-31431
This repository contains an Ansible playbook that mitigates CVE-2026-31431 by disabling and unloading the vulnerable `algif_aead` kernel module. The playbook automates the remediation process for affected systems.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
Access to the target system with root/sudo privileges · Ansible installed on the control node
nomisec
SUSPICIOUS
by jbiniek · poc
https://github.com/jbiniek/copy.fail-mitigation-MLM
The repository contains a vague README with no technical details about CVE-2026-31431, instead describing a generic mitigation step without exploit code or vulnerability analysis.
Classification
Suspicious 90%
Target:
Multi-Linux Manager
Auth required
Prerequisites:
access to Multi-Linux Manager configuration
github
WRITEUP
by adampielak · shellpoc
https://github.com/adampielak/CVE-2026-31431_SCA_WAZUH
This repository provides a Wazuh SCA policy and mitigation script for CVE-2026-31431, focusing on detecting exposure and verifying mitigation controls for the 'Copy Fail' vulnerability. It includes checks for kernel module states, mitigation file presence, and container hardening signals.
Classification
Writeup 95%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
Access to Wazuh agent configuration · Ability to modify kernel module settings
github
WORKING POC
by jiangban046-spec · pythonpoc
https://github.com/jiangban046-spec/CVE-2026-31431-exploit_py2_py3
This repository contains a functional exploit for CVE-2026-31431, leveraging an AF_ALG-based page cache write primitive to achieve local privilege escalation by modifying /etc/passwd to remove the root password. The exploit is compatible with both Python 2 and 3.
Classification
Working Poc 95%
Target:
Linux Kernel (specific version not specified)
No auth needed
Prerequisites:
Local access to the target system · Readable /etc/passwd file · Kernel with vulnerable AF_ALG implementation
github
SCANNER
by makitos666 · powershellpoc
https://github.com/makitos666/CVE-2026-31431-Copy-Fail-Detection-Toolkit
The repository contains a PowerShell script designed to detect indicators of CVE-2026-31431 (Copy Fail) in WSL and Docker environments by checking for vulnerable kernel modules, AF_ALG sockets, and suspicious processes. It does not include exploit code but focuses on scanning for potential vulnerabilities.
Classification
Scanner 95%
Target:
Linux kernel (WSL/Docker environments)
No auth needed
Prerequisites:
WSL or Docker installed on the target system
github
WORKING POC
by dixyes · cpoc
https://github.com/dixyes/fuck_cve_2026_31431
This repository contains a Linux Kernel Module (LKM) that exploits CVE-2026-31431 by unregistering the vulnerable `algif_aead` implementation and optionally registering a fake implementation to prevent reloading. The exploit targets a flaw in the AF_ALG socket interface, likely leading to a denial-of-service or privilege escalation.
Classification
Working Poc 90%
Target:
Linux Kernel (specific version not specified)
Auth required
Prerequisites:
Linux kernel with vulnerable AF_ALG implementation · ability to load kernel modules (root access)
nomisec
WORKING POC
by Aurillium · poc
https://github.com/Aurillium/RootRemover
This repository contains a functional exploit for CVE-2026-31431, a local privilege escalation vulnerability. The exploit modifies the root password field in /etc/passwd via a 4-byte page-cache write, allowing passwordless root access via `su`.
Classification
Working Poc 95%
Target:
Linux kernel (Debian derivatives)
Auth required
Prerequisites:
Local user access · Readable /etc/passwd · Root password not hashed in /etc/passwd
github
WORKING POC
by eleveni386 · gopoc
https://github.com/eleveni386/CVE-2026-31431-Golang
This repository contains a functional Go-based exploit for CVE-2026-31431, targeting a Linux AF_ALG local privilege escalation vulnerability. The exploit leverages socket operations and splice to manipulate kernel memory, ultimately attempting to escalate privileges by executing '/usr/bin/su'.
Classification
Working Poc 95%
Target:
Linux Kernel (AF_ALG subsystem)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · ability to execute binaries
github
WORKING POC
by nisec-eric · pythonpoc
https://github.com/nisec-eric/cve-2026-31431
This repository contains a fully functional exploit for CVE-2026-31431, a Linux kernel local privilege escalation (LPE) vulnerability. The exploit leverages a logic bug in the `authencesn` cryptographic template, chained with `AF_ALG` and `splice()`, to achieve a 4-byte page-cache write, enabling reliable privilege escalation.
Classification
Working Poc 100%
Target:
Linux kernel (versions 2017-2026, patched in v6.18.22+, v6.19.12+, v7.0+)
Auth required
Prerequisites:
Local access to a vulnerable Linux system · User-level permissions
github
WORKING POC
by pascal-gujer · pythonpoc
https://github.com/pascal-gujer/CVE-2026-31431
This repository contains functional exploit code for CVE-2026-31431, a Linux local privilege escalation vulnerability in the `authencesn` logic via `AF_ALG` and `splice()`. It includes both the original PoC and an ARM64 variant, both of which attempt to overwrite `/usr/bin/su` to gain a root shell.
Classification
Working Poc 100%
Target:
Linux kernel (specific versions affected by CVE-2026-31431)
No auth needed
Prerequisites:
Unpatched Linux kernel vulnerable to CVE-2026-31431 · Local user access · Presence of `/usr/bin/su`
nomisec
WORKING POC
by mrowkoob · poc
https://github.com/mrowkoob/copy-fail-mitigate-no-reboot
This repository provides a functional mitigation script for CVE-2026-31431 (Copy Fail vulnerability) by disabling the vulnerable `algif_aead` kernel module and attempting to evict the first page of `/usr/bin/su` from the page cache. The script includes clear instructions for application, verification, and reversion.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
root/sudo access · vulnerable kernel with `algif_aead` module loaded
github
WORKING POC
by WavesMan · pythonpoc
https://github.com/WavesMan/cve-2026-31431-fleet-remediator
This repository contains a functional exploit PoC for CVE-2026-31431, targeting a Linux kernel vulnerability. The tool automates batch SSH login, vulnerability detection, and remediation (disabling `algif_aead` and kernel upgrades) across multiple hosts.
Classification
Working Poc 95%
Target:
Linux Kernel (specific version not specified)
Auth required
Prerequisites:
SSH access to target hosts · Python >= 3.13 · uv package manager
github
WORKING POC
by wuzuowei · pythonpoc
https://github.com/wuzuowei/copy-fail-CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, a Linux kernel vulnerability in the authencesn AEAD optimization that allows local privilege escalation to root via AF_ALG socket manipulation and splice() system calls. The exploit targets the page cache of setuid binaries like /usr/bin/su to achieve arbitrary write primitives.
Classification
Working Poc 95%
Target:
Linux Kernel (2017 - pre-patch versions)
No auth needed
Prerequisites:
Local user access · Presence of setuid binary (e.g., /usr/bin/su) · AF_ALG socket support in kernel
github
WORKING POC
by Isw-9 · pythonpoc
https://github.com/Isw-9/copy-fail-cve-2026-31431-aarch64
The repository contains a functional exploit for CVE-2026-31431 targeting aarch64 and x86_64 architectures. The exploit leverages a socket-based attack to achieve local privilege escalation by overwriting the `/usr/bin/su` binary with a decompressed payload.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified, verified on Ubuntu 25.10 aarch64)
No auth needed
Prerequisites:
aarch64 or x86_64 architecture · local access to the target system
github
WORKING POC
by freelabz · pythonpoc
https://github.com/freelabz/CVE-2026-31431
The PoC exploits a local privilege escalation vulnerability by manipulating socket options and sending crafted messages to achieve root access. It uses a combination of socket operations and file descriptor manipulation to overwrite the `/usr/bin/su` binary with a malicious payload.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Local access to the target machine
nomisec
WORKING POC
by ryan2929 · poc
https://github.com/ryan2929/CVE-2026-31431
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2026-31431, leveraging the Linux AF_ALG socket interface and splice system calls to manipulate file descriptors and execute privileged commands. The exploit targets specific Linux kernel and Python versions, demonstrating a root shell via the 'su' binary.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions listed in README)
No auth needed
Prerequisites:
Linux kernel versions listed in README · Python 3.8.10 or 3.10.6 · Access to /usr/bin/su
nomisec
WORKING POC
by guard-wait · poc
https://github.com/guard-wait/CVE-2026-31431_EXP
This repository contains a C-based exploit for CVE-2026-31431, which leverages a vulnerability in the Linux kernel's AF_ALG socket implementation to overwrite read-only page cache entries, similar to DirtyPipe. The exploit targets `/usr/bin/su` to achieve local privilege escalation (LPE) by injecting a malicious ELF payload.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Local access · Presence of a root-owned SUID binary (e.g., `/usr/bin/su`)
nomisec
SCANNER
by arkdev1 · poc
https://github.com/arkdev1/check-cve-2026-31431
This repository contains a bash script to check for the presence of CVE-2026-31431 by verifying kernel versions, package updates, and AF_ALG socket accessibility. It also includes a mitigation script to disable AF_ALG modules if needed.
Classification
Scanner 95%
Target:
Linux kernel (AF_ALG interface)
Auth required
Prerequisites:
root access · Linux system with AF_ALG support
github
WRITEUP
by thrandomv · poc
https://github.com/thrandomv/cve-2026-31431-detection
This repository provides defensive detection content for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability in the `algif_aead` crypto interface. It includes Sigma rules, auditd configurations, a Falco rule for containers, and a triage playbook for SOC analysts and detection engineers.
Classification
Writeup 100%
Target:
Linux kernel (algif_aead crypto interface)
No auth needed
Prerequisites:
Unpatched Linux kernel · Access to AF_ALG socket interface
github
WORKING POC
by someCorp · shellpoc
https://github.com/someCorp/copyFail-CVE-2026-31431-workaround-bash
The repository contains a functional exploit for CVE-2026-31431, which involves disabling the 'algif_aead' kernel module via modprobe configuration to prevent exploitation. The script checks for required commands, ensures root privileges, and applies a workaround to mitigate the vulnerability.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
Auth required
Prerequisites:
root access · presence of 'algif_aead' kernel module
github
WORKING POC
by Y5neKO · cpoc
https://github.com/Y5neKO/copy-fail-CVE-2026-31431-universal
This repository contains functional exploit code for CVE-2026-31431, a use-after-free (UAF) vulnerability in the AF_ALG AEAD splice implementation in the Linux kernel. The exploit replaces the page cache of /usr/bin/su with a malicious ELF payload to achieve privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG subsystem)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · ability to execute code on the target system
github
WORKING POC
by adysec · rustpoc
https://github.com/adysec/cve-2026-31431
This repository contains a functional Rust exploit for CVE-2026-31431, leveraging a Linux kernel vulnerability in the AF_ALG socket interface combined with splice() to achieve local privilege escalation. The exploit targets /usr/bin/su and demonstrates a 732-byte payload to gain root access.
Classification
Working Poc 95%
Target:
Linux Kernel (AF_ALG + splice() page cache write)
No auth needed
Prerequisites:
Linux system with vulnerable kernel · ability to execute binaries · access to /usr/bin/su
github
WRITEUP
by insomnisec · poc
https://github.com/insomnisec/Detections-CVE-2026-31431
This repository provides a detailed technical analysis and detection guidance for CVE-2026-31431, a Linux kernel local privilege escalation vulnerability in the `algif_aead` / `authencesn` cryptographic template. It includes YARA rules, auditd rules, and mitigation steps but does not contain functional exploit code.
Classification
Writeup 100%
Target:
Linux kernel 4.14 – 6.18.21
No auth needed
Prerequisites:
Unprivileged user access · Readable target file (e.g., /etc/passwd)
github
WORKING POC
by vishwanathakuthota · pythonpoc
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
The repository contains a functional exploit for CVE-2026-31431, leveraging a Linux kernel vulnerability to achieve local privilege escalation (LPE). The exploit manipulates socket options and file descriptors to overwrite the `/usr/bin/su` binary with a malicious payload, granting root access.
Classification
Working Poc 90%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Local access to the target system · Kernel vulnerability present in the target system
github
WORKING POC
by JnamerZ · cpoc
https://github.com/JnamerZ/CopyFail-CVE-2026-31431
This repository contains a functional exploit for CVE-2026-31431, leveraging a vulnerability in the Linux kernel's AF_ALG socket implementation to achieve local privilege escalation (LPE). The exploit manipulates the `splice` and `sendmsg` system calls to corrupt kernel memory and execute shellcode, ultimately spawning a root shell via `su`.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified, but likely recent kernels with AF_ALG support)
No auth needed
Prerequisites:
Local access to the target system · Kernel with AF_ALG support · Ability to compile and execute the exploit binary
github
WORKING POC
by ruattd · poc
https://github.com/ruattd/cve-2026-31431
This repository contains a GitHub Actions workflow that tests for CVE-2026-31431 by executing a remote payload to achieve root privilege escalation. The workflow confirms successful exploitation by checking for root UID in the output.
Classification
Working Poc 90%
Target:
GitHub Actions runner (ubuntu-latest)
No auth needed
Prerequisites:
GitHub Actions workflow execution environment
github
WORKING POC
by luotian2 · cpoc
https://github.com/luotian2/CVE-2026-31431
The repository contains functional exploit code (exp.c and exp.py) for CVE-2026-31431, a Linux kernel privilege escalation vulnerability in the authencesn cryptographic template. The exploit leverages a logic bug to perform controlled 4-byte writes into the page cache of any readable file, enabling local privilege escalation.
Classification
Working Poc 100%
Target:
Linux kernel with CONFIG_CRYPTO_AUTHENC (since 2017)
No auth needed
Prerequisites:
Local access to a vulnerable Linux system · Python 3.10+ or a C compiler
github
WORKING POC
by gubaiovo · cpoc
https://github.com/gubaiovo/CVE-2026-31431
This repository contains a functional proof-of-concept exploit for CVE-2026-31431, leveraging the Linux kernel's AF_ALG socket interface to manipulate page cache and achieve local privilege escalation. The exploit uses crafted cryptographic operations to overwrite a target SUID binary (default: /usr/bin/su) with a malicious ELF payload, resulting in arbitrary code execution with elevated privileges.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Linux system with AF_ALG socket support · Presence of a SUID binary (e.g., /usr/bin/su)
github
WORKING POC
by b5null · cpoc
https://github.com/b5null/CVE-2026-31431-C
This repository contains a functional local privilege escalation exploit for CVE-2026-31431, targeting a Linux kernel vulnerability in the AF_ALG crypto subsystem. The exploit uses splice operations and AF_ALG sockets to corrupt kernel memory and patch the /usr/bin/su binary in memory, allowing root access without credentials.
Classification
Working Poc 95%
Target:
Linux Kernel (AF_ALG crypto subsystem)
No auth needed
Prerequisites:
Vulnerable Linux kernel version · CONFIG_CRYPTO_USER_API_AEAD enabled · User namespaces permitted · Local shell access
nomisec
WORKING POC
by Crihexe · poc
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
This repository contains a minimal 801-byte Linux x86_64 no-libc ELF proof-of-concept for CVE-2026-31431, leveraging a Copy Fail vulnerability in the Linux kernel's AF_ALG socket implementation. The exploit uses crafted AEAD operations to trigger the vulnerability and execute arbitrary code.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Linux x86_64 system · gcc · ld · llvm-strip
nomisec
WORKING POC
by ZephrFish · poc
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
This repository contains a functional Python exploit for CVE-2026-31431, leveraging AF_ALG and splice to overwrite the page cache of setuid-root binaries, achieving local privilege escalation (LPE) on Linux systems. The exploit is well-documented, supports multiple architectures, and includes diagnostic and scanning capabilities.
Classification
Working Poc 95%
Target:
Linux kernel (AF_ALG + splice)
No auth needed
Prerequisites:
Linux kernel with AF_ALG and authencesn support · Python 3.6+ · setuid-root binary present on the system
github
WORKING POC
by painoob · pythonpoc
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
This repository contains functional exploit code for CVE-2026-31431, a Linux local privilege escalation vulnerability in the kernel crypto API via AF_ALG. The exploit manipulates page cache data of SUID binaries to gain root access.
Classification
Working Poc 95%
Target:
Linux kernel (specific versions not specified)
No auth needed
Prerequisites:
AF_ALG enabled · algif_aead module loaded · Python 3.10+ for Python exploit
nomisec
WORKING POC
by jneuhauser · poc
https://github.com/jneuhauser/copy-fail-CVE-2026-31431
The repository contains a functional Python exploit for CVE-2026-31431, leveraging a socket-based attack to achieve local privilege escalation (LPE) by manipulating file descriptors and splicing data to overwrite the `/usr/bin/su` binary with a malicious payload.
Classification
Working Poc 95%
Target:
Linux kernel (multiple distributions)
No auth needed
Prerequisites:
Local access to the target system · Kernel version vulnerable to CVE-2026-31431
github
WORKING POC
by Alfredooe · gopoc
https://github.com/Alfredooe/CVE-2026-31431
This Go-based exploit targets CVE-2026-31431 by leveraging AF_ALG socket manipulation and splice operations to achieve local privilege escalation. It crafts malicious control messages and uses a pipe to trigger the vulnerability in the Linux kernel's crypto subsystem.
Classification
Working Poc 95%
Target:
Linux kernel (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Linux system · Ability to execute binaries
github
SUSPICIOUS
by mhdgning131 · pythonpoc
https://github.com/mhdgning131/CVE-2026-31431_poc
The repository contains minimal content with no actual exploit code, only a vague README with a generic command sequence that does not provide technical details about the vulnerability. The commands listed are nonsensical and do not align with typical exploit execution.
Classification
Suspicious 90%
Target:
unknown
No auth needed
Prerequisites:
none specified
metasploit
WORKING POC
EXCELLENT
by Xint Code, rootsecdev, Spencer McIntyre, Diego Ledda · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2026_31431_copy_fail.rb
This Metasploit module exploits CVE-2026-31431, a Linux kernel logic flaw in the authencesn AEAD template via AF_ALG socket and splice(), enabling unprivileged local users to perform a controlled 4-byte write into the page cache of any readable file, leading to local privilege escalation.
Classification
Working Poc 100%
Target:
Linux kernel (affected versions between commit 72548b093ee3 and a664bf3d603d)
No auth needed
Prerequisites:
Local access to the target system · Python binary available on the target