Source: Microsoft Security Blog
Author: Microsoft Defender Security Research Team
URL: https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/
ONE SENTENCE SUMMARY:
Dirty Frag is a Linux local privilege escalation exploiting esp4/esp6 and rxrpc kernel components, enabling reliable root escalation post-compromise.
MAIN POINTS:
- Newly disclosed LPE “Dirty Frag” targets Linux kernel networking and memory-fragment handling.
- Affected components include esp4, esp6 (CVE-2026-43284), and rxrpc (CVE-2026-43500).
- Public PoCs suggest higher reliability than timing-sensitive race-condition Linux escalation techniques.
- Attacks typically follow initial access via SSH, web-shells, container escape, or low-privileged accounts.
- Impacted ecosystems include Ubuntu, RHEL, CentOS Stream, AlmaLinux, Fedora, openSUSE, and OpenShift.
- Microsoft Defender is monitoring related activity and developing detections and protections.
- Root access enables disabling security tools, credential theft, log tampering, lateral movement, and persistence.
- Multiple kernel attack paths improve consistency across vulnerable environments.
- Exploit behavior resembles CopyFail (CVE-2026-31431) via page cache manipulation, with added paths.
- Exposure increases where IPsec/VPN and xfrm-related functionality keeps vulnerable modules enabled.
TAKEAWAYS:
- Treat any foothold on vulnerable Linux hosts as potentially becoming root quickly.
- Reduce attack surface by disabling unused rxrpc and, if feasible, esp/xfrm functionality.
- Limit unnecessary local shell availability and harden container boundaries to slow post-compromise escalation.
- Monitor aggressively for anomalous privilege changes and kernel-module load/unload activity.
- Prepare rapid kernel patch deployment once vendor advisories and fixed builds are available.