A newly disclosed Linux kernel vulnerability named Fragnesia is raising security concerns across the cybersecurity community after researchers confirmed the flaw can allow local attackers to gain root access through page cache corruption techniques. The vulnerability, tracked as CVE-2026-46300 with a CVSS score of 7.8, was discovered by researcher William Bowling of the V12 security team and affects the Linux kernel’s XFRM ESP in TCP subsystem. Security researchers described the issue as another local privilege escalation flaw capable of giving attackers elevated system access without requiring race conditions or highly complex exploitation methods. Fragnesia emerged shortly after the discovery of Dirty Frag and Copy Fail, making it the third major Linux local privilege escalation issue identified within a two week period.
According to cybersecurity researchers at Wiz, the vulnerability enables unprivileged local attackers to modify read only file contents within the kernel page cache and achieve root privileges using what they described as a deterministic page cache corruption primitive. Researchers explained that the flaw abuses a logic issue inside the Linux XFRM ESP in TCP subsystem, allowing arbitrary byte writes into kernel page cache memory associated with read only files. Similar to Dirty Frag and Copy Fail, Fragnesia reportedly enables immediate privilege escalation on multiple major Linux distributions by corrupting memory linked to the /usr/bin/su binary. V12 researchers also released a proof of concept exploit demonstrating how the vulnerability could be used to gain elevated access across affected environments. Multiple Linux distributions have already issued security advisories or mitigation guidance, including Ubuntu, Debian, Red Hat Enterprise Linux, SUSE Linux Enterprise, AlmaLinux, Amazon Linux, and CloudLinux.
Security maintainers stated that organizations which already implemented mitigations for Dirty Frag may not require immediate additional action until patched kernels become available. CloudLinux maintainers noted that the same mitigation strategies remain effective because both vulnerabilities target the same attack surface within Linux networking components. However, Red Hat stated it is still evaluating whether existing protections fully address CVE-2026-46300 across all affected systems. Researchers at Wiz also explained that AppArmor restrictions on unprivileged user namespaces may offer partial mitigation by forcing attackers to bypass additional restrictions before exploitation can succeed. Unlike Dirty Frag, though, Fragnesia reportedly does not require host level privileges before exploitation begins, increasing concerns around local compromise scenarios involving shared servers, development environments, or containerized workloads. Microsoft Security Response Center advised organizations to apply available patches as quickly as possible while also recommending temporary mitigation measures where patch deployment cannot immediately occur.
Security guidance issued by vendors and researchers includes disabling esp4, esp6, and related xfrm or IPsec functionality where operationally feasible, limiting unnecessary shell access, hardening containerized environments, and increasing monitoring for suspicious privilege escalation activity. The disclosure also coincides with reports from threat intelligence platform ThreatMon regarding a threat actor using the alias “berz0k” who is allegedly advertising a Linux zero day local privilege escalation exploit for $170,000 on cybercrime forums. According to ThreatMon, the seller claimed the exploit functions across multiple major Linux distributions and uses a TOCTOU based technique capable of stable local privilege escalation without crashing systems. The alleged exploit reportedly deploys a shared object payload inside the /tmp directory during execution. While researchers and vendors stated there is currently no evidence of active exploitation targeting Fragnesia in real world attacks, the rapid appearance of multiple Linux kernel privilege escalation flaws has increased pressure on organizations to accelerate patch management, review system hardening policies, and strengthen monitoring around abnormal system activity and unauthorized privilege escalation attempts.
Follow the SPIN IDG WhatsApp Channel for updates across the Smart Pakistan Insights Network covering all of Pakistan’s technology ecosystem.