CVE-2026-31431 Copy Fail Exploit Is Public: 5 Threats to Patch This Week
A 732-byte Python script grants root access on every Linux distribution compiled from a kernel released since 2017, and CISA added the underlying flaw, CVE-2026-31431, to its Known Exploited Vulnerabilities catalog on May 1 with a mandatory federal patch deadline of May 15.
**CVE-2026-31431 Linux privilege escalation**, nicknamed Copy Fail, targets the algif_aead module inside the Linux kernel's AF_ALG cryptographic API. Three separate kernel code changes made in 2011, 2015, and 2017 each appeared correct in isolation but together create a logic error in how the kernel handles in-place authenticated encryption operations. An unprivileged local user can exploit this logic error to corrupt the kernel's in-memory page cache of any readable file, including setuid binaries, without modifying the file on disk. The result: root access, reliably, with no race conditions required. Working exploit code in Python, Go, and Rust variants has already been published to open-source repositories.
The exploitation threshold is extremely low. Any environment allowing untrusted local code execution is directly at risk: cloud multi-tenant virtual machines, shared Kubernetes nodes, developer workstations, CI/CD runners, and containerized environments sharing the host kernel. Microsoft Defender Security Research Team confirmed preliminary threat actor testing activity consistent with building reliable exploitation chains. Wiz's analysis confirms the vulnerability affects millions of cloud Linux workloads and thousands of Kubernetes clusters.
This week brings four additional active threats beyond Copy Fail. CVE-2026-35616, a pre-authentication API bypass in Fortinet FortiClient EMS, carries a CVSS score of 9.1 and has been actively exploited since March 31. The Everest ransomware group has claimed 100 GB of Liberty Mutual Insurance data including policyholder financial records. Chrome CVE-2026-5281, a WebGPU use-after-free flaw, is being actively exploited for code execution. A coordinated supply chain attack compromised Trivy, KICS, LiteLLM, and Bitwarden CLI, stealing cloud credentials, SSH keys, and Kubernetes configuration files from over 1,000 cloud environments.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.
How Does CVE-2026-31431 Copy Fail Work?
The algif_aead module provides userspace applications with access to Linux kernel cryptographic primitives through the AF_ALG socket interface. **CVE-2026-31431 Copy Fail** exists in how the module handles in-place encryption operations, where input and output memory buffers occupy the same physical pages in the kernel's page cache.
Three changes to the Linux kernel accumulated between 2011 and 2017 to create the vulnerability. The 2011 change introduced AF_ALG socket support. A 2015 modification altered how the module allocates and manages cryptographic operation memory. A 2017 update changed how the kernel handles concurrent page cache reads and writes during cryptographic operations. None of the three changes was individually dangerous. Together, they allow a local unprivileged process to trigger a write to the kernel's page cache for any readable file without modifying the file on disk.
The exploit mechanism works in three steps. The attacker opens an AF_ALG socket and configures it for AEAD (Authenticated Encryption with Associated Data) in-place mode. By crafting specific message parameters, the attacker causes the kernel to overwrite its cached copy of a readable setuid binary with attacker-controlled content. The original file on disk remains unchanged, but the kernel's in-memory copy is replaced. The next execution of that binary runs the attacker's modified version with root privileges.
Researchers from Theori and Xint published a 732-byte Python proof-of-concept that reliably triggers the privilege escalation with no race conditions. Go and Rust variants of the exploit are already present in public repositories on GitHub and Codeberg. The CVSS score of 7.8 reflects the local access requirement, but the absence of race conditions makes this exploit significantly more reliable than the score alone suggests.
For context on nation-state actors actively targeting Linux perimeter appliances where Copy Fail could enable deeper lateral movement after initial access, see the [UNC5221 BRICKSTORM APT analysis](/blog/unc5221-brickstorm-china-apt-legal-saas-espionage).
Which Systems Are Vulnerable to CVE-2026-31431?
CVE-2026-31431 affects all Linux distributions running a kernel released since 2017 that includes the algif_aead module, which is enabled by default in virtually every mainstream distribution. Red Hat issued advisory RHSB-2026-02 confirming all supported RHEL versions are affected. Canonical confirmed Ubuntu 18.04 LTS through 24.04 LTS. SUSE, Debian, Arch, Manjaro, and Amazon Linux 2023 advisories confirm equivalent exposure.
Cloud and container environments carry elevated risk. Any Linux workload where multiple users or processes share a kernel is directly vulnerable: Kubernetes multi-tenant clusters, shared VPS environments, CI/CD build systems, and container environments accessing the host kernel. Wiz researchers identified millions of cloud Linux workloads running vulnerable kernels as of May 1, 2026.
The attack requires local code execution as an unprivileged user and cannot be exploited remotely on its own. But any application that executes untrusted user-supplied code on a Linux host effectively converts Copy Fail into an unauthenticated root exploit chain. Web servers running user-supplied scripts, Jupyter notebook servers, developer sandboxes, and CI/CD systems accepting external pull requests are all environments where the local access requirement provides no meaningful protection.
Kernel versions 6.18.22, 6.19.12, and 7.0 contain the fix. Distribution vendors shipped patched kernels within 24 hours of coordinated disclosure. CISA's BOD 22-01 mandate applies to all federal civilian executive branch agencies with a May 15, 2026 deadline. Non-federal organizations should treat this as same-day patching given publicly available exploit code and confirmed active exploitation.
Threat #2: CVE-2026-35616 Fortinet FortiClient EMS CVSS 9.1 Demands Full Upgrade
**CVE-2026-35616** is a pre-authentication API access bypass in Fortinet FortiClient EMS (Endpoint Management Server) that allows an unauthenticated remote attacker to execute arbitrary code by sending crafted API requests without any credentials. Fortinet assigned a CVSS score of 9.1 under CWE-284 Improper Access Control, and CISA added it to the Known Exploited Vulnerabilities catalog on April 6.
Defused Cyber researchers first observed exploitation in honeypot environments on March 31, 2026. Disclosure followed on April 5. CISA set a federal remediation deadline of April 9, one of the shortest KEV-to-deadline windows on record. The affected versions are FortiClient EMS 7.4.5 and 7.4.6.
Fortinet released out-of-band hotfix packages for both affected versions, but CyberScoop reporting confirmed the hotfix does not fully remediate the vulnerability. Only FortiClient EMS 7.4.7, the full patch release, closes the complete attack surface. Organizations that applied the hotfix and consider themselves protected are still exposed.
This is the second critical unauthenticated vulnerability in FortiClient EMS disclosed within weeks: CVE-2026-21643, also rated CVSS 9.1, preceded it. Two consecutive critical pre-authentication flaws in the same product within a short window signals sustained targeted research against FortiClient EMS infrastructure. Organizations running Fortinet EMS for endpoint management should treat the 7.4.7 upgrade as mandatory, review server-side API access logs for anomalous unauthenticated requests dating back to March 31, and alert any customer environments managed through compromised EMS instances.
“Fortinet customers confront an actively exploited zero-day with a full patch still pending — only 7.4.7 closes it completely.”
CyberScoop, April 2026
Threat #3 and #4: Everest Ransomware Claims Liberty Mutual and Chrome Zero-Day in the Wild
The Everest ransomware group posted Liberty Mutual Insurance to its dark web data leak site in late April 2026, claiming to have exfiltrated over 100 GB of data including policyholder names, addresses, policy numbers, and financial records tied to individual and corporate accounts. Everest set a three-day contact deadline before staged publication of the stolen data.
**Everest** is a double-extortion ransomware operation active since at least 2020 that has claimed more than 116 victims in the past 12 months, concentrating on insurance, healthcare, and financial services. The group steals data before encrypting systems and publishes staged samples on its dark web leak site to pressure victims. The Liberty Mutual proof samples include insurance policy documentation, a terrorism policy active from October 2025 through October 2026, and group privacy notices, consistent with access to policy administration systems.
Liberty Mutual had not issued a public confirmation at time of this briefing. The pattern is consistent with double-extortion victims entering private negotiation before triggering public disclosure obligations. For insurance and financial services organizations, this follows the ShinyHunters pattern from the [April 29 weekly briefing](/blog/shinyhunters-medtronic-adt-vishing-salesforce-breach): policyholder data and third-party SaaS access remain primary attacker targets.
**Chrome CVE-2026-5281** is a use-after-free vulnerability in Chrome's WebGPU implementation through the Dawn GPU abstraction layer. Google confirmed active exploitation before the patch was released. Attackers direct Chrome users to malicious web pages that execute crafted WebGPU operations, triggering memory corruption in the GPU processing pipeline and enabling arbitrary code execution within the Chrome renderer process. When chained with a sandbox escape, this achieves full system compromise. Any system running Chrome prior to version 146.0.7680.177 is exposed to drive-by exploitation from malicious web pages.
Threat #5: Multi-Vendor Supply Chain Attack Hits Trivy, KICS, Bitwarden, and LiteLLM
A coordinated supply chain attack disclosed by Socket researchers and The Register on April 27, 2026 compromised multiple widely-used security and developer tools across a two-month window. **TeamPCP** attackers stole CI/CD secrets from Aqua Security's Trivy vulnerability scanner in February 2026 and used those stolen credentials to compromise additional tools by March 23, 2026.
The impacted packages include KICS (Checkmarx), LiteLLM, Telnyx, Bitwarden CLI, and two Checkmarx Open VSX plugins. The Lapsus$ extortion group and the Vect ransomware group subsequently partnered with TeamPCP to monetize the stolen data. Trivy alone infected over 1,000 cloud environments. Bitwarden CLI affects more than 50,000 businesses and 10 million users. One confirmed victim, Mercor, had 939 GB of source code exfiltrated after LiteLLM was compromised.
The stolen data includes cloud provider credentials, SSH keys, and Kubernetes configuration files from affected CI/CD environments. Any organization whose pipeline used any of these tools between February and April 2026 should treat every credential and key in those pipelines as compromised regardless of whether anomalous activity has been observed. LiteLLM was also covered in the [May 1 weekly briefing](/blog/cpanel-zero-day-snow-malware-weekly-roundup) in the context of CVE-2026-42208 SQL injection; the TeamPCP supply chain compromise is a separate, compounding incident affecting the same software in the same period.
Rotate all affected secrets before end of business Monday. Audit CI/CD build logs for unexpected outbound connections to external endpoints and review cloud provider access logs for API calls originating from unusual locations or at unusual times.
Key IOCs From This Week's Five Active Threats
The following indicators of compromise and version checks address all five confirmed threats in this briefing. Run these against your SIEM, EDR, asset inventory, and configuration management tooling immediately. For CVE-2026-31431, no network-layer IOC detection is viable since the exploit runs entirely locally. Version-based verification and kernel patch status are the only reliable controls for Copy Fail.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Monday Morning Remediation Checklist: 7 Steps Before EOD
Security teams returning Monday May 4 face confirmed active exploitation across five threat categories with public exploit code for the highest-urgency item. The following steps are ordered by CISA urgency, CVSS score, and available exploit code. Complete all seven before end of business today.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
The bottom line
CVE-2026-31431 Linux privilege escalation is this week's most urgent exposure: a 732-byte public exploit grants root on every Linux system since 2017, CISA has confirmed active exploitation, and the federal patch deadline is May 15 — 11 days from today. Fortinet CVE-2026-35616 at CVSS 9.1 requires a full upgrade to FortiClient EMS 7.4.7, not just the hotfix. Update Chrome, rotate supply chain secrets, and cross-reference the latest CISA KEV additions against your asset inventory before end of business Monday. One unpatched kernel or one un-rotated CI/CD secret is all an attacker needs this week.
Frequently asked questions
What is CVE-2026-31431 Copy Fail?
CVE-2026-31431 Copy Fail is a local privilege escalation vulnerability in the Linux kernel's algif_aead cryptographic module that allows any unprivileged local user to corrupt the kernel's in-memory copy of a readable file, including setuid binaries, without modifying the file on disk. Three separate kernel code changes from 2011, 2015, and 2017 collectively create the logic error. An attacker exploits this to obtain root access reliably with no race conditions. CISA added CVE-2026-31431 to its Known Exploited Vulnerabilities catalog on May 1, 2026 with a federal remediation deadline of May 15.
Which Linux distributions are affected by CVE-2026-31431?
All Linux distributions running a kernel released since 2017 that includes the algif_aead module are affected, which means virtually every mainstream distribution in current use. Confirmed affected distributions include Red Hat Enterprise Linux (all supported versions), Ubuntu 18.04 LTS through 24.04 LTS, SUSE Linux Enterprise, Debian, Arch Linux, Manjaro, and Amazon Linux 2023. Patched kernels are available at versions 6.18.22, 6.19.12, and 7.0 depending on the distribution release train. Cloud providers including AWS, Azure, and Google Cloud publish kernel patching guidance in their security bulletins.
Is there a public exploit for CVE-2026-31431?
Yes. Theori and Xint researchers published a 732-byte Python proof-of-concept exploit that reliably triggers privilege escalation on any unpatched Linux system without requiring race conditions. Go and Rust variants of the exploit are also available on public repositories including GitHub and Codeberg. The existence of multiple working exploit variants in public repositories significantly increases the probability of opportunistic exploitation by threat actors who did not develop the original vulnerability. Microsoft Defender Security Research Team confirmed preliminary threat actor testing activity following public disclosure.
How do I patch CVE-2026-31431 on Red Hat or Ubuntu?
On Red Hat Enterprise Linux, run the dnf update kernel command as root and reboot. Red Hat advisory RHSB-2026-02 specifies the exact patched kernel version for each supported RHEL release. On Ubuntu, run apt update followed by apt upgrade linux-image-generic as root and reboot. Canonical's advisory links to the patched kernel package for each Ubuntu LTS version. After rebooting, verify the running kernel version with the uname -r command and confirm it matches the patched version listed in your distribution advisory.
What is CVE-2026-35616 in Fortinet FortiClient EMS?
CVE-2026-35616 is a pre-authentication API access bypass in Fortinet FortiClient Endpoint Management Server versions 7.4.5 and 7.4.6, rated CVSS 9.1. It allows an unauthenticated remote attacker to execute arbitrary code by sending crafted API requests without credentials. Active exploitation was first observed on March 31, 2026. The out-of-band hotfix released for affected versions does not fully remediate the vulnerability. Only FortiClient EMS 7.4.7 contains the complete fix. CISA added this to the KEV catalog on April 6 with a three-day federal remediation deadline.
Has Liberty Mutual confirmed the Everest ransomware breach?
Liberty Mutual had not issued a public statement confirming or denying the Everest ransomware group's claim at the time of this briefing on May 4, 2026. Everest posted Liberty Mutual to its dark web data leak site with proof samples including insurance policy documentation tied to individual and corporate accounts. The absence of a public denial combined with the specificity of the published samples is consistent with double-extortion victims entering private negotiation rather than triggering public disclosure obligations. Insurance and financial services organizations should treat third-party access to policyholder systems as elevated risk during this period.
How does Chrome CVE-2026-5281 get exploited?
CVE-2026-5281 is a use-after-free vulnerability in Chrome's WebGPU implementation through the Dawn GPU abstraction layer. An attacker directs a Chrome user to a malicious web page that executes crafted WebGPU operations, triggering memory corruption in the GPU processing pipeline and enabling arbitrary code execution within the Chrome renderer process. When chained with a sandbox escape vulnerability, this achieves full system compromise. Google confirmed active in-the-wild exploitation before releasing the patch. Update Chrome to version 146.0.7680.177 or later on all platforms immediately.
How do I detect if the Trivy or KICS supply chain attack affected my environment?
Review whether your CI/CD pipelines or container scanning workflows used Trivy, KICS, LiteLLM, Bitwarden CLI, or Telnyx between February and April 2026. If any of these tools were in use, treat all cloud credentials, SSH keys, and Kubernetes configuration files accessible through those pipelines as compromised and rotate them immediately. Audit CI/CD build logs for unexpected outbound HTTPS connections to non-registry endpoints. Socket Research and The Register's April 27 reporting provide the specific compromised package versions and container image tags. Review cloud provider access logs for anomalous API calls from builder environments.
Sources & references
- CISA — Known Exploited Vulnerabilities Catalog (CVE-2026-31431 added May 1, 2026)
- The Hacker News — CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
- Tenable — Copy Fail (CVE-2026-31431): Linux Kernel Privilege Escalation FAQ
- Wiz Blog — Copy Fail: Universal Linux Local Privilege Escalation Vulnerability
- Red Hat — RHSB-2026-02 Cryptographic Subsystem Privilege Escalation Linux Kernel (CVE-2026-31431)
- The Hacker News — Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
- CyberScoop — Fortinet customers confront actively exploited zero-day, with a full patch still pending
- Cybernews — Liberty Mutual breach: Everest ransomware claims 100 GB of policyholder data
- eSecurityPlanet — Chrome Vulnerability CVE-2026-5281 Exploited in the Wild
- The Register — Ongoing supply-chain attack targets security, dev tools
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
