CVE-2026-31431 is a Linux kernel flaw enabling root access, with PoC public and CISA KEV listed

Summary:

CVE-2026-31431, known as Copy Fail, is a critical Linux kernel local privilege escalation vulnerability affecting major distributions since 2017. The flaw resides in the algif_aead cryptographic module and allows unprivileged users to manipulate kernel page cache memory to achieve full root access.

A public proof-of-concept exploit is available and is reported to be highly reliable across multiple Linux distributions. The vulnerability has been added to CISA’s Known Exploited Vulnerabilities catalog, with early indications of active exploitation observed in the wild. Given its widespread exposure and ease of exploitation, immediate patching is strongly recommended.

Technical Description:

The vulnerability originates from a logic flaw in the algif_aead kernel module, introduced through long-standing changes in AF_ALG AEAD socket handling and in-place memory optimizations. The flaw enables unsafe memory operations where overlapping buffers result in controlled writes to kernel page cache memory.

Attackers can exploit this condition to inject controlled data into the in-memory representation of files without modifying the actual disk content. This allows the bypassing of file integrity monitoring systems and eliminates traditional forensic traces.

The vulnerability can also be leveraged alongside higher-level system components such as package management frameworks, further expanding attack paths. Its presence across multiple distributions for several years significantly increases the potential attack surface, especially in cloud and containerized environments.

CVE CVSS Vulnerability Type Affected Product Patch version
CVE-2026-31431 7.8 Local Privilege Escalation (LPE)
Logic Bug – Incorrect Resource Transfer Between Spheres (CWE-669)
Linux Kernel algif_aead crypto module
(all kernels since 2017)
Vendor-specific patched kernel packages
(see distribution security advisories)

Exploitation Demonstration:

  • An attacker gains local access through methods such as RCE, SSH compromise, CI/CD pipeline abuse, or physical access
  • The attacker opens an AF_ALG AEAD socket using the vulnerable kernel module without requiring elevated privileges
  • Carefully crafted system calls such as splice() and sendmsg() trigger the memory corruption condition
  • Controlled data is written into the page cache of a privileged SUID binary without modifying the file on disk
  • The corrupted in-memory binary executes with root privileges, granting full system access and persistence

Ease of Exploitation:

The vulnerability is considered highly exploitable due to its deterministic behavior and absence of complex timing requirements. The publicly available proof-of-concept enables rapid exploitation, often within seconds of initial access.

Since the exploit operates entirely in memory, it avoids detection by traditional security tools that rely on file-based analysis. Its compatibility across multiple Linux distributions and environments, including cloud and container systems, further amplifies the risk.

Conclusion:

CVE-2026-31431 represents a critical and actively exploitable Linux kernel vulnerability with widespread impact across systems running since 2017. Its inclusion in the Known Exploited Vulnerabilities (KEV) catalog and the availability of a deterministic public exploit significantly increase the risk of rapid, large-scale exploitation.

The vulnerability enables attackers to escalate from unprivileged access to full root control within seconds, without requiring complex conditions or leaving forensic traces. Given its reliability and applicability across cloud, container, and enterprise environments, organizations must assume exposure where patching has not been completed.

Immediate remediation, continuous monitoring of kernel-level activity, and strict access control enforcement are essential to reduce the risk of compromise.

Impact:

Successful exploitation of Copy Fail grants full root access to the compromised Linux system, allowing attackers to take complete control of the host environment. From this level of access, attackers can install persistent backdoors, deploy ransomware, exfiltrate sensitive data such as SSH keys, service credentials, databases, and cloud API tokens, and move laterally across internal networks and Kubernetes clusters.

In cloud and containerized environments, this vulnerability can enable container escape and compromise of the underlying host, potentially impacting multiple co-located workloads and tenants. The in-memory nature of the exploit leaves no disk-based forensic trace, significantly complicating detection and incident response.

For organizations in the UAE and broader GCC region, a successful root-level compromise may trigger mandatory regulatory reporting requirements under frameworks such as UAE PDPL and NCA ECC. Given the widespread use of Linux in critical infrastructure, financial services, and cloud environments across the region, this vulnerability poses both operational and compliance risks.

Globally, the impact extends across industries, particularly affecting organizations relying on Linux servers, cloud-native platforms, CI/CD pipelines, and multi-tenant infrastructure, where a single compromised host can lead to large-scale systemic exposure.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Privilege Escalation, Execution, Persistence, Defence Evasion, Impact
Technique Name Local Privilege Escalation via algif_aead AF_ALG Socket, In-Memory Page Cache Corruption via splice() and sendmsg(), SUID Binary In-Memory Overwrite, Container Escape in Kubernetes Environments, Root Shell or Persistent SUID Backdoor, Zero-Trace Disk Forensics Evasion
Sub Technique Name Local access gained (web RCE / SSH / CI runner)
AF_ALG AEAD socket opened
splice()/sendmsg() sequence triggers in-memory page cache corruption of SUID binary
Root shell established
Zero disk trace (no file change, no journalctl crash, no forensic artefact on disk)
Persistent SUID backdoor established (optional post-exploitation)
Attack Type Vulnerability
Targeted Applications Ubuntu (all releases before 26.04 Resolute), Amazon Linux 2023, RHEL 10.1 and earlier, SUSE 16, Debian, Fedora, Arch Linux, Any Linux distribution running kernels from 2017 until patched versions.

High-risk environments: Kubernetes nodes, cloud workloads, CI/CD runners
Region Impacted Global
Industry Impacted Cross-industry (organisations running Linux servers, cloud workloads, Kubernetes clusters, CI/CD pipelines, multi-tenant environments)
IOC’s N/A (stealth in-memory exploitation with minimal forensic traces)
CVE CVE-2026-31431

Recommended Actions:

  • Apply vendor-issued patched kernel packages immediately and reboot systems to ensure the updated kernel is active
  • Verify kernel versions across all systems using commands such as uname -r and compare against vendor advisories
  • If patching is not immediately feasible, temporarily disable the vulnerable algif_aead module using module blacklisting and unloading mechanisms
  • Prioritize remediation for cloud environments, Kubernetes nodes, CI/CD systems, and multi-tenant infrastructure where a single compromise can impact multiple workloads
  • Treat any successful remote code execution (RCE), SSH compromise, or container breach as a potential full host compromise due to rapid privilege escalation capability
  • Deploy runtime security or endpoint protection tools capable of detecting kernel-level anomalies and in-memory exploitation behavior
  • Enable and monitor logging for AF_ALG socket usage and unusual kernel crypto subsystem activity initiated by non-root users
  • Monitor system logs (dmesg, journalctl) for anomalies such as crashes, assertion failures, or unusual kernel behavior
  • Reduce local attack surface by restricting unnecessary user accounts and enforcing least privilege across all Linux systems
  • Strengthen access controls for SSH, CI/CD pipelines, and administrative interfaces to minimize initial access vectors

Reference:

https://www.microsoft.com/en-us/security/blog/2026/05/01/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation/