7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Local Privilege Escalation in snapd
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
References
- https://ubuntu.com/security/CVE-2026-3888 issue-tracking vdb-entry
- https://ubuntu.com/security/notices/USN-8102-1 vendor-advisory
- https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888 vendor-advisory technical-description
- https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-388… media-coverage technical-description
- https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt media-coverage technical-description
Affected products
- *
- <2.75.1