Much like Soiled Frag, Fragnesia (CVE-2026-46300) is a neighborhood privilege escalation gap that exploits a vulnerability within the XFRM ESP-in-TCP subsystem to realize a reminiscence write primitive within the kernel. XFRM is an IP framework meant for packet transformations, and ESP-in-TCP (Encapsulating Safety Payload in TCP) is a networking approach used to encapsulate IPsec ESP packets inside TCP segments.
A proof of idea (PoC) exploit is already publicly obtainable.
The excellent news, Beggs stated, is that the vulnerability can’t be exploited remotely. An attacker wants native entry to set off particular code paths and have the ability to management native socket operations and manipulate packet fragmentation.
Nonetheless, he added, any unprivileged person can exploit the bug on a susceptible system to deprave security-sensitive information in reminiscence, akin to privileged entry administration configuration, password, systemd service information, or cron jobs. Though the attacker can’t modify the file on the disk, modifying in-memory information can trick privileged processes, alter system habits, execute arbitrary code, and escalate privileges on the system, he stated.


