CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability

CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability

The National Vulnerability Database has identified CVE-2026-5161, a critical ‘link following’ vulnerability within the TUBITAK BILGEM Software Technologies Research Institute’s Pardus About application. This flaw, rated with a CVSS score of 8.8, allows for symlink attacks, potentially enabling attackers to manipulate file access with significant consequences.

The vulnerability affects Pardus About versions prior to 1.2.1. Attackers can exploit this by crafting specific inputs that trick the application into resolving symbolic links incorrectly, leading to unauthorized access, modification, or deletion of sensitive files on the system. This type of attack bypasses intended file access controls and can be a stepping stone for deeper system compromise.

Defenders must prioritize patching Pardus About to version 1.2.1 or later immediately. For systems that cannot be immediately patched, implement strict file integrity monitoring and review access controls for symbolic links. Understanding the attack vector, specifically how the application handles file paths and symbolic links, is crucial for mitigating this risk.

What This Means For You

  • If your organization uses TUBITAK BILGEM's Pardus About, verify your version is at or above 1.2.1. If not, patch immediately. Audit file system logs for any unusual file access patterns that could indicate a symlink attack.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1608.001 Initial Access

CVE-2026-5161: Pardus About Symlink Attack Attempt

Sigma YAML — free preview
title: CVE-2026-5161: Pardus About Symlink Attack Attempt
id: scw-2026-04-29-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-5161 by creating a symlink that points to sensitive files like /etc/passwd, which is a common target for privilege escalation or information disclosure. This rule specifically looks for the characteristic symlink creation patterns associated with this vulnerability in Pardus About.
author: SCW Feed Engine (AI-generated)
date: 2026-04-29
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-5161/
tags:
  - attack.initial_access
  - attack.t1608.001
logsource:
    category: file_event
detection:
  selection:
      TargetFilename|contains:
          - '/proc/self/fd/'
      TargetObject|contains:
          - '/etc/passwd'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-5161 Vulnerability CVE-2026-5161
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 29, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal

CVE-2026-7384 — A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument...

vulnerabilityCVEhigh-severitypath-traversalcwe-22
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 6 Sigma

CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking

CVE-2026-5141 — Improper Privilege Management, Improper Access Control, Incorrect privilege assignment vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center allows Hijacking a...

vulnerabilityCVEhigh-severityimproper-access-controlcwe-266cwe-269cwe-284
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma

Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)

CVE-2026-41952 — Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect...

vulnerabilityCVEhigh-severityprivilege-escalationcwe-123
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 1 IOC /⚙ 3 Sigma