CVE-2026-41651 (Pack2TheRoot): Allows instant root access on default Linux systems.

Summary:

A high-severity local privilege escalation vulnerability (CVE-2026-41651), known as Pack2TheRoot, has been disclosed in the PackageKit daemon, impacting multiple major Linux distributions, including Ubuntu, Debian, Fedora, and Red Hat-based systems. The vulnerability allows any unprivileged local user to gain full root access without authentication.

The flaw has existed across PackageKit versions for over a decade and can be exploited within seconds. A patch is available, and organizations must prioritize immediate remediation across Linux endpoints, servers, and cloud environments, particularly in regions with extensive Linux adoption, such as GCC and MENA.

Technical Description:

CVE-2026-41651 is a Time-of-Check Time-of-Use (TOCTOU) race condition within the PackageKit daemon’s transaction handling logic. The vulnerability arises from improper validation of transaction flags, allowing attacker-controlled inputs to be applied after authorization checks have been completed.

An attacker can manipulate the transaction state by modifying flags during execution, causing the system to perform privileged actions under altered conditions. This enables the installation of arbitrary packages containing scriptlets that execute with root privileges.

PackageKit operates via D-Bus and can be activated on demand, meaning it does not need to be actively running for exploitation to occur. The vulnerability affects a wide range of systems, including enterprise environments where PackageKit is installed as a dependency, significantly increasing the attack surface. The details and technicalities of the attack campaign are discussed further,

CVE CVSS Vulnerability Type Affected Product Patch version
CVE-2026-41651 8.8 Local Privilege Escalation (LPE)
/ TOCTOU Race Condition
PackageKit (versions 1.0.2 through 1.3.4) 1.3.5

Exploitation Demonstration:

  • An attacker prepares a malicious package containing a post-install script that executes root-level commands
  • A legitimate package installation request is initiated via the PackageKit D-Bus interface
  • A race condition is triggered by rapidly modifying transaction flags during execution
  • The system is tricked into installing the malicious package instead of the verified one
  • The post-install script executes with root privileges, granting full system control

Ease of Exploitation:

The vulnerability is highly exploitable due to its reliance on logic flaws rather than complex memory corruption. Attackers only require local access to trigger the race condition, which can be achieved through various initial access methods such as phishing or compromised credentials.

The exploit is reliable, fast, and difficult to detect using traditional security tools, as it operates within legitimate system processes. Its presence across multiple Linux distributions for over 12 years further increases exposure and risk.

Conclusion:

Pack2TheRoot represents a critical security risk due to its simplicity, widespread impact, and ability to grant immediate root access. As a post-exploitation enabler, it allows attackers to escalate privileges rapidly once initial access is obtained.

Organizations must treat this vulnerability as a priority, ensuring immediate patching and strengthening monitoring capabilities to detect potential exploitation attempts.

Impact:

Successful exploitation results in full root-level control over affected systems. Attackers can install persistent backdoors, exfiltrate sensitive data, disable security controls, and move laterally across networks.

The compromise of Linux servers can lead to significant operational disruption, data breaches, and regulatory implications, particularly in sectors handling sensitive information or critical workloads.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Privilege Escalation, Execution, Persistence, Defence Evasion, Impact
Technique Name Local Privilege Escalation via PackageKit D-Bus Interface, Unprivileged Package Installation as Root, TOCTOU Race Condition Exploitation, Malicious Package Scriptlet Execution, Rootkit or Backdoor Installation, Audit Log Tampering
Sub Technique Name Low-privilege local access gained, pkcon or D-Bus API call crafted with malicious transaction flags, TOCTOU race condition triggered, PackageKit executes package installation with root privileges, Scriptlet runs as root, Full root shell or SUID binary established, PackageKit daemon crashes (observable in journalctl – primary IOC)
Attack Type Vulnerability
Targeted Applications Ubuntu (18.04, 22.04, 24.04 LTS, 26.04 Beta), Debian Trixie 13.4, Fedora 42–44, Rocky Linux 10.1, RHEL with Cockpit, Any Linux distribution shipping PackageKit 1.0.2 through 1.3.4
Region Impacted Global
Industry Impacted Cross-industry (any organisation running Linux endpoints, servers, or cloud workloads)
IOC’s Search for Unauthorized Package Installs grep -E 'Installed|Install' /var/log/dnf.log /var/log/yum.log /var/log/dpkg.log 2>/dev/null Find Suspicious SUID Binaries find /tmp -perm -4000 -ls Monitor D-Bus Activity dbus-monitor --system "destination=org.freedesktop.PackageKit" Audit Authorization Failures journalctl -u packagekit | grep -iE 'error|denied|NOT_AUTHORIZED'
CVE CVE-2026-41651 (Pack2TheRoot)

Recommended Actions:

  • Update PackageKit to version 1.3.5 or later across all systems
  • Disable or remove PackageKit if not required, especially on critical servers
  • Identify vulnerable systems using package version checks and prioritize remediation
  • Monitor system logs for PackageKit daemon crashes and unusual activity
  • Alert on unauthorized package installations initiated by non-privileged users
  • Implement auditing for D-Bus interactions related to PackageKit
  • Minimize local user access and enforce least privilege principles
  • Maintain secure backups and prepare for system recovery in case of compromise

Reference:

https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html