CVE-2026-45253
Received Received - Intake
Kernel Code Execution via ptrace(PT_SC_REMOTE) Validation Bypass

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: FreeBSD

Description
ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-21
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freebsd freebsd From 14.3-RELEASE-p14 (inc) to 15.0-RELEASE-p9 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the ptrace(PT_SC_REMOTE) operation in FreeBSD, where the system call fails to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls.

Because of this missing validation, a user who has the ability to debug a process can execute arbitrary code in the kernel, even if the target process does not have special privileges.

In simpler terms, an unprivileged local user with debugging capabilities can exploit this flaw to escalate their privileges and potentially gain full control over the affected system.


How can this vulnerability impact me? :

This vulnerability allows an unprivileged local user to execute arbitrary code in the kernel, which can lead to privilege escalation.

As a result, an attacker could gain full control of the affected FreeBSD system, compromising its security and integrity.

There is no available workaround, so affected systems must be patched and rebooted to mitigate the risk.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should upgrade their FreeBSD systems to the patched versions released by the FreeBSD Project. These patches are available for stable/15, stable/14, and their respective release branches.

Upgrades can be performed using pkg(8), freebsd-update(8), or by applying the source code patches provided in the advisory.

After applying the updates or patches, a system reboot is required to ensure the fixes take effect.

No workaround is available, so timely patching is critical to prevent exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unprivileged local user to escalate privileges and potentially gain full control of the affected FreeBSD system by exploiting missing parameter validation in the ptrace(PT_SC_REMOTE) operation.

Such a privilege escalation and potential full system compromise could lead to unauthorized access to sensitive data or system resources, which may impact compliance with standards and regulations like GDPR and HIPAA that require protection of personal and sensitive information.

However, the provided information does not explicitly discuss or analyze the direct impact of this vulnerability on compliance with these or other common standards and regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There is no specific detection method or commands provided to identify exploitation or presence of this vulnerability on a network or system.

The advisory recommends upgrading the affected FreeBSD systems to patched versions using pkg(8), freebsd-update(8), or applying source code patches followed by a reboot.

No workaround or detection commands are mentioned in the available resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart