LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-3888 - Vulnerability Analysis

HighCVSS: 7.8

Last Updated: March 18, 2026

snapd - Privilege Escalation

Published: March 17, 2026Updated: March 18, 2026PoC Available

Overview

snapd on Linux (Ubuntu 16.04 LTS to 24.04 LTS) contains a local privilege escalation caused by re-creation of snap's private /tmp directory during systemd-tmpfiles cleanup, letting local attackers gain root privileges.

Severity & Score

Severity: High
CVSS Score: 7.8
EPSS Score: 0.6%(Probability of exploitation in next 30 days)

Impact

Local attackers can gain root privileges, fully compromising the system.

Mitigation

Update to the latest snapd version with the fix applied.

Social Media Activity(1 post)

/r/netsec
/r/netsec
@_r_netsec
Apr 17, 2026

Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888) https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root

View original post

Details

CVE ID
CVE-2026-3888
Severity
High
CVSS Score
7.8
Type
broken_access_control
Status
unconfirmed
EPSS
0.6%
Social Posts
1

CWE

  • CWE-268

CVSS Metrics

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.6%Probability of exploitation in the next 30 days