Systemd

5 CVEs product

Monthly

CVE-2026-40228 LOW Monitor

systemd-journald in systemd 259 allows local attackers to send ANSI escape sequences to terminals of arbitrary users via the logger utility when ForwardToWall=yes is enabled, enabling terminal manipulation and information disclosure attacks with low CVSS impact but realistic local access requirements.

Information Disclosure Systemd
NVD VulDB
CVSS 3.1
2.9
EPSS
0.0%
CVE-2026-40227 MEDIUM This Month

Denial of service in systemd 260 allows local unprivileged users to crash the systemd daemon by triggering an assert via IPC API calls containing arrays or maps with null elements. The vulnerability affects systemd versions 260 through 260, with no public exploit code identified at time of analysis. EPSS score of 6.2 reflects moderate real-world risk due to local-only attack vector and non-privileged requirements.

Information Disclosure Systemd
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-40226 MEDIUM This Month

Escape-to-host vulnerability in systemd nspawn (versions 233-259) allows local privileged users to break container isolation via a crafted optional config file, enabling arbitrary code execution on the host system. CVSS 6.4 reflects high integrity and confidentiality impact but requires high privilege and difficult attack conditions. No public exploit code or active exploitation has been confirmed at the time of analysis.

Information Disclosure Systemd
NVD GitHub
CVSS 3.1
6.4
EPSS
0.0%
CVE-2026-40225 MEDIUM This Month

Local root code execution in systemd's udev subsystem before version 260 allows attackers with physical access to craft malicious hardware devices that exploit unsanitized kernel output, achieving privilege escalation from local user context to root. The attack requires physical device insertion but no user interaction; CVSS 6.4 reflects the physical attack vector constraint, though successful exploitation grants complete system compromise. No public exploit code or active exploitation has been confirmed at time of analysis.

Information Disclosure Systemd
NVD GitHub
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-4598 MEDIUM POC PATCH Monitor

A vulnerability was found in systemd-coredump. Rated medium severity (CVSS 4.7). Public exploit code available and no vendor patch available.

Information Disclosure Linux Systemd Openshift Container Platform Enterprise Linux +4
NVD
CVSS 3.1
4.7
EPSS
0.1%
CVE-2026-40228
EPSS 0% CVSS 2.9
LOW Monitor

systemd-journald in systemd 259 allows local attackers to send ANSI escape sequences to terminals of arbitrary users via the logger utility when ForwardToWall=yes is enabled, enabling terminal manipulation and information disclosure attacks with low CVSS impact but realistic local access requirements.

Information Disclosure Systemd
NVD VulDB
CVE-2026-40227
EPSS 0% CVSS 6.2
MEDIUM This Month

Denial of service in systemd 260 allows local unprivileged users to crash the systemd daemon by triggering an assert via IPC API calls containing arrays or maps with null elements. The vulnerability affects systemd versions 260 through 260, with no public exploit code identified at time of analysis. EPSS score of 6.2 reflects moderate real-world risk due to local-only attack vector and non-privileged requirements.

Information Disclosure Systemd
NVD GitHub
CVE-2026-40226
EPSS 0% CVSS 6.4
MEDIUM This Month

Escape-to-host vulnerability in systemd nspawn (versions 233-259) allows local privileged users to break container isolation via a crafted optional config file, enabling arbitrary code execution on the host system. CVSS 6.4 reflects high integrity and confidentiality impact but requires high privilege and difficult attack conditions. No public exploit code or active exploitation has been confirmed at the time of analysis.

Information Disclosure Systemd
NVD GitHub
CVE-2026-40225
EPSS 0% CVSS 6.4
MEDIUM This Month

Local root code execution in systemd's udev subsystem before version 260 allows attackers with physical access to craft malicious hardware devices that exploit unsanitized kernel output, achieving privilege escalation from local user context to root. The attack requires physical device insertion but no user interaction; CVSS 6.4 reflects the physical attack vector constraint, though successful exploitation grants complete system compromise. No public exploit code or active exploitation has been confirmed at time of analysis.

Information Disclosure Systemd
NVD GitHub
CVE-2025-4598
EPSS 0% CVSS 4.7
MEDIUM POC PATCH Monitor

A vulnerability was found in systemd-coredump. Rated medium severity (CVSS 4.7). Public exploit code available and no vendor patch available.

Information Disclosure Linux Systemd +6
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy