Researchers and major Linux distributions are sounding alarms about a newly identified local privilege escalation vulnerability in the Linux kernel, known as CVE-2026-46300 or “Fragnesia.”
This flaw targets the kernel’s XFRM ESP-in-TCP subsystem, allowing unprivileged local attackers to overwrite critical system files and gain root privileges.
According to Microsoft researchers, Fragnesia functions similarly to previous vulnerabilities like Dirty Frag and Copy Fail.
It utilizes a kernel memory write primitive that can corrupt essential files, including /usr/bin/su and /etc/passwd, posing a significant threat to system integrity.
Joe Brinkley, Head of Offensive Security Research at Cobalt, emphasizes the implications of this vulnerability.
He notes that Fragnesia marks a shift from complex exploitations to more straightforward, commoditized execution methods.
This trend indicates a dangerous evolution in attack strategies.
Brinkley warns that the increasing reliability of these exploits allows attackers to bypass traditional security measures effortlessly.
The ability to overwrite critical files transforms these vulnerabilities from mere technical curiosities into serious threats capable of full system compromise.
In light of this, he urges defenders to prioritize kernel patching, stressing that response times must match the rapid pace of exploitation.
As cloud workloads and CI/CD pipelines increasingly rely on Linux, organizations must act swiftly to safeguard their systems against this evolving threat landscape.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.




