CVE-2026-3888
HIGHLocal Privilege Escalation in snapd
Title source: cnaDescription
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Exploits (6)
nomisec
WORKING POC
by TheCyberGeek · poc
https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE
nomisec
SCANNER
by Many-Hat-Group · poc
https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher
nomisec
WORKING POC
by fevar54 · poc
https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.
References (6)
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
0.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-268
Status
published
Products (6)
Canonical/Ubuntu 16.04 LTS
2.61.4ubuntu0.16.04.1+esm2
Canonical/Ubuntu 18.04 LTS
2.61.4ubuntu0.18.04.1+esm2
Canonical/Ubuntu 20.04 LTS
2.67.1+20.04ubuntu1~esm1
Canonical/Ubuntu 22.04 LTS
2.73+ubuntu22.04.1
Canonical/Ubuntu 24.04 LTS
2.73+ubuntu24.04.1
Canonical/Ubuntu 24.04 LTS
2.73+ubuntu24.04.2
Published
Mar 17, 2026
Tracked Since
Mar 17, 2026