Windows Zero-Day Exploit MiniPlasma Exposes SYSTEM Vulnerability

A security researcher has uncovered a Windows zero-day exploit, dubbed MiniPlasma, that can grant SYSTEM privileges on fully patched systems, revealing a vulnerability that was originally reported to Microsoft in 2020 but left unpatched. The researcher released a proof-of-concept exploit on GitHub, highlighting…

https://osintsights.com/windows-zero-day-exploit-miniplasma-exposes-system-vulnerability?utm_source=mastodon&utm_medium=social

#WindowsZeroday #Miniplasma #LocalPrivilegeEscalation #SystemVulnerability #CloudFilterDriver

Windows Zero-Day Exploit MiniPlasma Exposes SYSTEM Vulnerability

Learn about the Windows Zero-Day Exploit MiniPlasma, a SYSTEM vulnerability. Discover how to protect your system and learn more about this exploit now.

OSINTSights

Linux Flaw Exposes Local Users to Root Access

A newly discovered Linux flaw, dubbed Fragnesia, allows unprivileged local users to gain root access by exploiting a weakness in the kernel's handling of shared page fragments, putting all Linux kernels released before May 13, 2026, at risk. This vulnerability can be triggered through a simple sequence of operations, making it a serious…

https://osintsights.com/linux-flaw-exposes-local-users-to-root-access?utm_source=mastodon&utm_medium=social

#LinuxFlaw #Cve202646300 #Fragnesia #LocalPrivilegeEscalation #KernelVulnerability

Linux Flaw Exposes Local Users to Root Access

Learn how Linux flaw CVE-2026-46300 lets local users gain root access and protect your system now with our expert security tips and patch guidance.

OSINTSights

Learn how Fragnesia (Copy Fail 3.0) exploits a Linux kernel logic bug to achieve 100% reliable root access. Find out if your distro is affected and how to patch.

Full details here: https://ostechnix.com/fragnesia-linux-root-exploit-copy-fail-3/

#Fragnesia #Copyfail30 #LPE #Linuxkernel #LocalPrivilegeEscalation #Security #Linux

Fragnesia: The "Copy Fail 3.0" Exploit Granting 100% Linux Root - OSTechNix

Learn how Fragnesia (Copy Fail 3.0) exploits a Linux kernel logic bug to achieve 100% reliable root access. Find out if your distro is affected and how to patch.

OSTechNix

Linux Kernel Vulnerability Exposes Root Access Risk via Page Cache Corruption

A newly discovered Linux Kernel vulnerability, dubbed Fragnesia, allows unprivileged local attackers to corrupt the kernel page cache and gain root access, posing a significant risk to system security. This critical flaw, tracked as CVE-2026-46300, is the third local privilege escalation…

https://osintsights.com/linux-kernel-vulnerability-exposes-root-access-risk-via-page-cache-corruption?utm_source=mastodon&utm_medium=social

#LinuxKernelVulnerability #Cve202646300 #LocalPrivilegeEscalation #PageCacheCorruption #XfrmEspintcp

Linux Kernel Vulnerability Exposes Root Access Risk via Page Cache Corruption

Learn about CVE-2026-46300, a Linux kernel vulnerability that allows unprivileged local attackers to achieve root access via page cache corruption, and find out how to protect your system now.

OSINTSights

Fragnesia (Linux LPE)

Fragnesia는 Linux 커널의 XFRM ESP-in-TCP 서브시스템의 논리적 버그를 악용하는 로컬 권한 상승(LPE) 익스플로잇이다. 이 취약점은 Dirty Pipe와 유사한 페이지 캐시 쓰기 버그 계열에 속하며, TCP 소켓이 ESP-in-TCP 모드로 전환될 때 AES-GCM 키스트림을 조작해 읽기 전용 파일의 페이지 캐시를 임의로 수정할 수 있다. 이를 통해 /usr/bin/su 바이너리의 메모리 내 복사본을 변조하여 루트 권한 쉘을 획득한다. 해당 취약점은 2026년 5월 13일 이전 Linux 커널 버전에 영향을 미치며, AppArmor 설정과 커널 모듈 비활성화로 완화할 수 있다.

https://github.com/v12-security/pocs/tree/main/fragnesia

#linux #security #localprivilegeescalation #kernel #exploit

pocs/fragnesia at main · v12-security/pocs

poc it like it's hot. Contribute to v12-security/pocs development by creating an account on GitHub.

GitHub

New Linux kernel security bug; Fragnesia

새로운 리눅스 커널 로컬 권한 상승 취약점 'Fragnesia'가 V12 보안팀의 William Bowling에 의해 발견되었다. 이 취약점은 Dirty Frag 취약점 계열에 속하며, ESP/XFRM ESP-in-TCP 서브시스템의 논리적 버그를 악용해 읽기 전용 파일의 커널 페이지 캐시에 임의 바이트 쓰기를 가능하게 한다. 공격자는 /usr/bin/su 바이너리의 페이지 캐시를 변조해 루트 쉘을 획득할 수 있으며, 아직 공식 커널 트리에 패치가 반영되지 않아 주의가 필요하다.

https://www.openwall.com/lists/oss-security/2026/05/13/3

#linux #kernel #security #localprivilegeescalation #exploit

oss-security - Linux kernel LPE ("fragnesia", copyfail 3.0)

Fragnesia Made Public as Latest Linux Local Privilege Escalation Vulnerability

최근 공개된 Fragnesia는 Linux 커널의 ESP/XFRM 코드 내 논리적 버그를 이용한 로컬 권한 상승(LPE) 취약점으로, 이전에 공개된 Dirty Frag와 유사한 유형입니다. 이 취약점은 읽기 전용 파일의 커널 페이지 캐시에 임의 바이트 쓰기를 허용하며, 이미 개념 증명 코드가 공개된 상태입니다. 문제를 해결하는 2줄짜리 패치가 제안되었으나 아직 메인라인 커널에 반영되지는 않았으며, 조만간 반영될 것으로 예상됩니다. Linux 보안 커뮤니티에서 활발히 논의 중인 중요한 보안 이슈입니다.

https://www.phoronix.com/news/Linux-Fragnesia

#linux #security #localprivilegeescalation #kernel #vulnerability

Fragnesia Made Public As Latest Linux Local Privilege Escalation Vulnerability

Following last week's disclosure of the Dirty Frag vulnerability for the Linux kernel, which only finished being patched up in mainline on Monday, Fragnesia is now public as a similar local privilege escalation (LPE) vulnerability.

Linux Vulnerability Exposes Widespread Risk of Local Privilege Escalation

A critical Linux vulnerability, dubbed copy.fail, poses a severe risk of local privilege escalation, allowing unprivileged processes to rapidly escalate to root access. This shocking flaw, considered one of the worst in years, can be exploited with alarming ease.

https://osintsights.com/linux-vulnerability-exposes-widespread-risk-of-local-privilege-escalation?utm_source=mastodon&utm_medium=social

#LinuxVulnerability #LocalPrivilegeEscalation #KernelVulnerability #AfalgSockets #EmergingThreats

Linux Vulnerability Exposes Widespread Risk of Local Privilege Escalation

Learn about the Linux vulnerability copy.fail that enables local privilege escalation and discover how to protect your system from this widespread risk now.

OSINTSights

Linux Distributions Scramble to Patch Dirty Frag Kernel Vulnerabilities

A critical vulnerability known as Dirty Frag has been discovered in the Linux kernel, allowing attackers with local access to gain root privileges across major distributions. Linux distributions are now racing against the clock to patch this chained local privilege escalation flaw.

https://osintsights.com/linux-distributions-scramble-to-patch-dirty-frag-kernel-vulnerabilities?utm_source=mastodon&utm_medium=social

#DirtyFrag #Linux #LocalPrivilegeEscalation #Lpe #KernelVulnerability

Linux Distributions Scramble to Patch Dirty Frag Kernel Vulnerabilities

Learn how Linux distributions are scrambling to patch Dirty Frag kernel vulnerabilities and protect against local privilege escalation attacks - read the latest updates now.

OSINTSights

Local privilege escalation via execve()

FreeBSD에서 execve() 시스템 호출의 연산자 우선순위 버그로 인해 버퍼 오버플로우가 발생하고, 이를 통해 권한 없는 사용자가 슈퍼유저 권한을 획득할 수 있는 로컬 권한 상승 취약점(CVE-2026-7270)이 발견되었다. 해당 취약점은 FreeBSD 13, 14, 15 버전의 여러 릴리즈 및 스테이블 브랜치에 영향을 미치며, 현재 패치가 배포되어 있으므로 즉시 시스템을 업데이트하고 재부팅할 것을 권고한다. 우회 방법은 없으며, 패치 적용 후 커널 재컴파일이 필요할 수 있다.

https://www.freebsd.org/security/advisories/FreeBSD-SA-26:13.exec.asc

#freebsd #security #localprivilegeescalation #execve #cve20267270