{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/snapd/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["privilege-escalation","snapd","ubuntu","CVE-2026-3888"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA local privilege escalation vulnerability, identified as CVE-2026-3888, affects Ubuntu 24.04 installations due to a flaw within the snapd service. This vulnerability allows a malicious local user to gain root privileges on a vulnerable system. The Qualys Research Team discovered and reported the vulnerability on March 17, 2026. Defenders should prioritize patching vulnerable systems to prevent potential exploitation. The vulnerability\u0026rsquo;s impact is significant, as successful exploitation grants…\u003c/p\u003e\n","date_modified":"2026-03-19T00:38:41Z","date_published":"2026-03-19T00:38:41Z","id":"/briefs/2026-03-snapd-lpe/","summary":"CVE-2026-3888 allows a local attacker to escalate privileges to root on Ubuntu 24.04 systems due to a vulnerability in the snapd service.","title":"Ubuntu 24.04 Snapd Local Privilege Escalation (CVE-2026-3888)","url":"https://feed.craftedsignal.io/briefs/2026-03-snapd-lpe/"}],"language":"en","title":"CraftedSignal Threat Feed — Snapd","version":"https://jsonfeed.org/version/1.1"}