CVE-2026-43284 – Linux Kernel Privilege Escalation

CVSS 8.8 IMPORTANT

“Two active kernel exploits mean attackers don’t wait—they move in.”

The latest Linux kernel patches address two high-severity vulnerabilities that enable privilege escalation and system compromise. These flaws affect core kernel operations, allowing attackers to gain root access and potentially take control of affected systems.

CVE-2026-31431 has a CVSS score of 7.8, which is High severity. Active exploitation has been observed in the wild.
CVE-2026-43284 has a CVSS score of 7.8, which is High severity. Active exploitation has been observed in the wild.

The patch eliminates critical escalation paths and reinforces kernel protections. With both vulnerabilities now confirmed as actively exploited, unpatched systems face immediate risk of compromise and unauthorized control.

Key Details

Affected Product
Linux Linux Kernel
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-123
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.