CVE-2026-43284 – Linux Kernel Privilege Escalation
“Two active kernel exploits mean attackers don’t wait—they move in.”
The latest Linux kernel patches address two high-severity vulnerabilities that enable privilege escalation and system compromise. These flaws affect core kernel operations, allowing attackers to gain root access and potentially take control of affected systems.
CVE-2026-31431 has a CVSS score of 7.8, which is High severity. Active exploitation has been observed in the wild.
CVE-2026-43284 has a CVSS score of 7.8, which is High severity. Active exploitation has been observed in the wild.
The patch eliminates critical escalation paths and reinforces kernel protections. With both vulnerabilities now confirmed as actively exploited, unpatched systems face immediate risk of compromise and unauthorized control.
Key Details
- Affected Product
- Linux Linux Kernel
- Attack Vector
- Local
- Attack Complexity
- Low
- Privileges Required
- Low
- User Interaction
- None
- CWE Classification
- CWE-123