DirtyDecrypt Exploit Code Hits Public: Linux Kernel LPE Flaw Now Weaponized
Urgent: Proof-of-Concept Exploit Released for Linux Kernel Privilege Escalation Bug
Security researchers have released a working proof-of-concept (PoC) exploit for a critical Linux kernel vulnerability, CVE-2026-31635, that allows local attackers to gain root privileges. The exploit, dubbed DirtyDecrypt (also known as DirtyCBC), was posted to public code repositories earlier today.

The flaw resides in the kernel's memory management subsystem and can be triggered by unprivileged users to elevate their system access. “This exploit turns a local user into a complete root-level attacker within seconds,” said Dr. Alina Torres, a vulnerability researcher at Zellic Security, which co-discovered the bug.
What We Know So Far
The Zellic and V12 security team originally reported the vulnerability on May 9, 2026. Shortly after, Linux kernel maintainers informed them that the issue had already been disclosed and patched in an earlier update. “It was a duplicate – but that doesn’t reduce the danger for unpatched systems,” Torres added.
Despite the patch being available for several weeks, many enterprise and personal devices remain unhardened. The public release of DirtyDecrypt significantly raises the stakes for administrators who have delayed updates.
Background
The Linux kernel has long been a target for privilege escalation exploits. DirtyDecrypt belongs to a family of attacks that manipulate memory corruption to bypass security checks. The vulnerability was assigned CVE-2026-31635 and affects kernel versions 6.1 through 6.8 (patched in 6.8.5+).
Notably, the flaw is similar in spirit to the famous Dirty Pipe (CVE-2022-0847) and Dirty COW (CVE-2016-5195) exploits – but uses a different vector related to CBC (Cipher Block Chaining) modes in kernel crypto routines, hence the name DirtyCBC.

What This Means
Administrators must treat this as a critical priority. Any system running an unpatched Linux kernel is at risk of full compromise, especially in multi-user environments like servers, containers, and cloud workloads.
Security firm V12 issued a statement urging immediate kernel updates: “If you haven’t applied the patch yet, assume you’ve been compromised. DirtyDecrypt gives local users direct root access – no user interaction required beyond gaining initial shell access.”
Mitigation Steps
- Update to the latest stable kernel (6.8.5 or higher).
- Restrict local user accounts and enable auditing for privilege escalation attempts.
- Monitor for unusual kernel module loads or unexpected root processes.
Technical Details
The exploit leverages a use-after-free bug in the kernel’s crypto_cbc code. By carefully spraying memory and triggering a race condition, an attacker can overwrite their own task credentials and assume root identity.
Torres noted that the PoC is reliable on commodity hardware, making it a dangerous tool for both penetration testers and malicious actors alike.
Related Articles
- Safeguarding AI Agents from Identity Theft: A Comprehensive How-To
- Adversary Tactics Diverge as Dwell Time Hits 14 Days, Mandiant Report Warns
- Breaking: Major Cybersecurity Incidents Unfold – 2.6M Employee Benefits Records Exposed, AI Platforms Under Siege
- Massive Canvas Cyberattack Paralyzes US Education as Final Exams Underway
- A Step-by-Step Guide to Meta's Enhanced End-to-End Encrypted Backup Infrastructure
- How a Brazilian DDoS Protection Firm Was Used to Launch Attacks on Its Own Customers
- Cyber's Defining Moments: Dark Reading Reveals 20 Events That Altered the Risk Landscape
- SailPoint GitHub Breach: Key Questions Answered