Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1518 articles · 106541 vulns · 38/55 feeds (7d)
← Back to list
—
CVE-2026-23391

netfilter: xt_CT: drop pending enqueued packets on template removal

Description

A vulnerability labeled as critical has been found in Linux Kernel up to 7.0-rc4. This issue affects some unknown processing of the component netfilter. Executing a manipulation can lead to privilege escalation. The attack needs to be done within the local network.

Affected Products

VendorProductVersions
LinuxLinux24de58f465165298aaa8f286b2592f0163706cfe, 24de58f465165298aaa8f286b2592f0163706cfe, 24de58f465165298aaa8f286b2592f0163706cfe, 24de58f465165298aaa8f286b2592f0163706cfe, 24de58f465165298aaa8f286b2592f0163706cfe, 24de58f465165298aaa8f286b2592f0163706cfe, 3.4, 7.0-rc4

References

  • https://git.kernel.org/stable/c/d2d0bae0c9a2a17b6990a2966f5cdce0813d6256
  • https://git.kernel.org/stable/c/63b8097cea1923fe82cd598068d0796da8c015ec
  • https://git.kernel.org/stable/c/19a230dec6bb8928e3f96387f9085cf2c79bcef9
  • https://git.kernel.org/stable/c/cb549925875fa06dd155e49db4ac2c5044c30f9c
  • https://git.kernel.org/stable/c/777d02efe3d630cca4c1b63962cec17c57711325
  • https://git.kernel.org/stable/c/f62a218a946b19bb59abdd5361da85fa4606b96b

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23391 | Linux Kernel up to 7.0-rc4 netfilter privilege escalation
→ No new info (linked only)
Tier C
Linux Kernel CVEs6h ago
CVE-2026-23391: netfilter: xt_CT: drop pending enqueued packets on template removal
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Published3/25/2026
Last enriched3h agov2
Trending Score50
Source articles2
Independent2
Info Completeness6/14
Missing: cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v2
Last enriched 3h ago
v2Tier C3h ago

Updated description with critical vulnerability details, added affected version 7.0-rc4, changed severity to CRITICAL, and noted that no exploit is available.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v16h ago

Initial creation