CVE-2026-24834

CRITICAL
9.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 22:03 vuln.today
PoC Detected
Feb 23, 2026 - 20:15 vuln.today
Public exploit code
Patch Released
Feb 23, 2026 - 20:15 nvd
Patch available
CVE Published
Feb 19, 2026 - 17:24 nvd
CRITICAL 9.3

Description

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.

Analysis

Incorrect permissions in Kata Containers allow container escape via file permission manipulation. PoC and patch available.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: inventory all systems running Kata Containers versions prior to 3.27.0 and assess which environments host untrusted workloads. Within 7 days: apply vendor patch 3.27.0 or later to all affected systems, prioritizing production environments and multi-tenant deployments. …

Sign in for detailed remediation steps.

Priority Score

67
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: +20

Vendor Status

Share

CVE-2026-24834 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy