HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical AppArmor “CrackArmor” Flaws Allow Unprivileged Users to Gain Root on Millions of Linux Systems

Qualys has identified nine AppArmor vulnerabilities—collectively called CrackArmor—that let an unprivileged user bypass mandatory‑access controls and obtain root privileges on Linux hosts. The bugs affect over 12 million systems, including cloud, container, and IoT deployments, making rapid patching essential for third‑party risk management.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 securityaffairs.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Critical AppArmor “CrackArmor” Flaws Allow Unprivileged Users to Gain Root on Millions of Linux Systems

What Happened — Qualys disclosed nine “CrackArmor” vulnerabilities in the Linux kernel’s AppArmor module that let an unprivileged user bypass mandatory‑access controls, execute code in kernel space, and obtain root privileges. Proof‑of‑concept exploits exist, but no CVEs have been assigned yet.

Why It Matters for TPRM

  • The flaws affect over 12 million Linux deployments, including cloud, container, and IoT environments that many third‑party vendors run.
  • Successful exploitation grants full system control, undermining confidentiality, integrity, and availability of downstream services.
  • Patch cycles vary across providers; unpatched systems can become a supply‑chain foothold for attackers.

Who Is Affected — Enterprises using Linux‑based workloads (cloud platforms, Kubernetes, SaaS applications), IoT device manufacturers, and any MSP/MSSP that hosts Linux containers.

Recommended Actions

  • Verify that all Linux hosts have received the latest kernel patches that address the CrackArmor bugs.
  • Review and harden AppArmor profiles; consider temporary disabling if patches cannot be applied immediately.
  • Re‑assess container isolation controls and monitor for abnormal privilege‑escalation activity.

Technical Notes — The vulnerabilities stem from a confused‑deputy issue in AppArmor profile handling, enabling namespace bypass, KASLR defeat, and kernel‑panic DoS. Affected distributions include Ubuntu, Debian, and SUSE where AppArmor is enabled by default. Source: https://securityaffairs.com/189487/hacking/unprivileged-users-could-exploit-apparmor-bugs-to-gain-root-access.html

📰 Original Source
https://securityaffairs.com/189487/hacking/unprivileged-users-could-exploit-apparmor-bugs-to-gain-root-access.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.