CVE-2026-3888
Local Privilege Escalation in snapd
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
| CWE | CWE-268 |
| Published | Mar 17, 2026 |
| Last Updated | Mar 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Canonical / Ubuntu 16.04 LTS
All versions affected Canonical / Ubuntu 18.04 LTS
All versions affected Canonical / Ubuntu 20.04 LTS
All versions affected Canonical / Ubuntu 22.04 LTS
All versions affected Canonical / Ubuntu 24.04 LTS
All versions affected References
ubuntu.com: https://ubuntu.com/security/CVE-2026-3888 ubuntu.com: https://ubuntu.com/security/notices/USN-8102-1 discourse.ubuntu.com: https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888 blog.qualys.com: https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root cdn2.qualys.com: https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt openwall.com: http://www.openwall.com/lists/oss-security/2026/03/18/1
Credits
Qualys Security Advisory Team