CVE-2026-3888

HIGH

Local Privilege Escalation in snapd

Title source: cna

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Exploits (6)

nomisec WORKING POC
by DanielTangnes · poc
https://github.com/DanielTangnes/CVE-2026-3888
nomisec WRITEUP
by nomaisthere · poc
https://github.com/nomaisthere/CVE-2026-3888
nomisec WORKING POC
by TheCyberGeek · poc
https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE
nomisec WORKING POC
by netw0rk7 · poc
https://github.com/netw0rk7/CVE-2026-3888-PoC
nomisec SCANNER
by Many-Hat-Group · poc
https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher
nomisec WORKING POC
by fevar54 · poc
https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 0.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-268
Status published
Products (6)
Canonical/Ubuntu 16.04 LTS 2.61.4ubuntu0.16.04.1+esm2
Canonical/Ubuntu 18.04 LTS 2.61.4ubuntu0.18.04.1+esm2
Canonical/Ubuntu 20.04 LTS 2.67.1+20.04ubuntu1~esm1
Canonical/Ubuntu 22.04 LTS 2.73+ubuntu22.04.1
Canonical/Ubuntu 24.04 LTS 2.73+ubuntu24.04.1
Canonical/Ubuntu 24.04 LTS 2.73+ubuntu24.04.2
Published Mar 17, 2026
Tracked Since Mar 17, 2026