CVE-2026-45253

HIGHNVD 8.4
8.4

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges.

The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system.

CVSS v3
8.4
EG Score
0.0(none)
EPSS
0.5%
KEV
Not listed

Published

May 21, 2026

Last Modified

May 21, 2026

Frequently asked(5)

What is CVE-2026-45253?
CVE-2026-45253 is a high vulnerability published on May 21, 2026. ptrace(PTSCREMOTE) failed to properly validate parameters for the syscall(2) and syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation…
When was CVE-2026-45253 disclosed?
CVE-2026-45253 was first published in the National Vulnerability Database on May 21, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
Is CVE-2026-45253 actively exploited?
CVE-2026-45253 is not currently on CISA's Known Exploited Vulnerabilities catalog. FIRST EPSS estimates a 0.5% percentile likelihood of exploitation in the next 30 days — higher percentiles indicate greater predicted risk.
What is the CVSS score of CVE-2026-45253?
CVE-2026-45253 has a CVSS v3 base score of 8.4 (NVD). EchelonGraph synthesises NVD + CISA KEV + FIRST EPSS + GHSA into a combined EG score of 0.0.
How do I remediate CVE-2026-45253?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-45253, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.

Dependency Blast Radius

See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-45253

Explore →

Is Your Infrastructure Affected by CVE-2026-45253?

EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.