Linux 'Copy Fail' Vulnerability Grants Root Access

Linux 'Copy Fail' Vulnerability Grants Root Access

A critical Linux local privilege escalation (LPE) flaw, dubbed ‘Copy Fail’ and tracked as CVE-2026-31431 (CVSS: 7.8), has been disclosed by Xint.io and Theori, as reported by The Hacker News. This high-severity vulnerability allows an unprivileged local user to achieve root access on major Linux distributions. The core issue lies in the ability to write four controlled bytes into the page cache of any readable file.

This isn’t just another bug; it’s a direct path to full system compromise from a local user context. The attacker’s calculus here is straightforward: gain initial low-privilege access, then leverage Copy Fail to elevate to root. This makes it a prime candidate for post-exploitation lateral movement and persistent access. The Hacker News emphasizes that this flaw impacts a broad range of Linux systems, making its remediation a top priority for defenders.

For CISOs, this means a critical review of your Linux estate is warranted. While the CVSS score is high, the ‘local’ aspect means an attacker needs some initial foothold. However, in complex environments with numerous services, containers, and user accounts, that initial foothold is often easier to achieve than we’d like to admit. This vulnerability lowers the bar significantly for privilege escalation once an attacker is on the box.

What This Means For You

  • If your organization uses Linux systems, this vulnerability is a game-changer for attackers. Prioritize patching CVE-2026-31431 on all affected distributions immediately. Audit your systems for any unusual local user activity, as this flaw could be exploited by existing low-privilege accounts or after initial access is gained.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1548.002 Privilege Escalation

Linux Copy Fail LPE - Target File Write

Sigma YAML — free preview

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-31431 Vulnerability CVE-2026-31431
Take action on this incident
📡 Monitor xint.io Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Xint.io All breaches, IOCs & vendor exposure

Related coverage on Xint.io

Sandhills Medical Discloses Inc Ransomware Breach Affecting 170,000 Patients

Sandhills Medical has publicly disclosed a significant ransomware attack by the Inc Ransom group that impacted approximately 170,000 individuals. The healthcare organization waited nearly a...

threat-intelvulnerabilitymalwareransomwaredata-breach
/SCW Vulnerability Desk /MEDIUM /⚑ 1 IOC /⚙ 4 Sigma

Google Gemini CLI RCE: CVSS 10 Flaw Exposes CI/CD to Attack

Google has patched a critical remote code execution (RCE) vulnerability in its Gemini CLI, specifically impacting the `@google/gemini-cli` npm package and the `google-github-actions/run-gemini-cli` GitHub Actions...

threat-intelvulnerabilitycloudtools
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 1 Sigma

Qinglong Task Scheduler Exploited for Cryptomining via RCE Flaws

BleepingComputer reports that attackers are actively exploiting two authentication bypass vulnerabilities in Qinglong, an open-source task scheduling tool. These flaws, if left unaddressed, allow threat...

threat-inteldata-breachmalwarevulnerabilitycloudidentitytoolsbleepingcomputer
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs