CVE-2026-26201
Published: 19 February 2026
Summary
CVE-2026-26201 is a high-severity Race Condition (CWE-362) vulnerability in Jm33-M0 Emp3R0R. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 14.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Accurate timestamps from internal clocks enable detection of race conditions by providing reliable event ordering in audit logs.
Coordination of concurrent security activities reduces the probability that shared resources will be accessed simultaneously without proper synchronization.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of the race condition directly triggers application crash/DoS on the C2 server process, matching T1499.004 (Application or System Exploitation).
NVD Description
emp3r0r is a C2 designed by Linux users for Linux environments. Prior to version 3.21.2, multiple shared maps are accessed without consistent synchronization across goroutines. Under concurrent activity, Go runtime can trigger `fatal error: concurrent map read and map write`,…
more
causing C2 process crash (availability loss). Version 3.21.2 fixes this issue.
Deeper analysisAI
CVE-2026-26201 is a concurrency vulnerability in emp3r0r, an open-source command-and-control (C2) framework designed for Linux environments. In versions prior to 3.21.2, multiple shared maps are accessed without proper synchronization across goroutines, leading to a race condition. Under concurrent activity, the Go runtime triggers a fatal error ("concurrent map read and map write"), causing the C2 process to crash and resulting in a loss of availability. The vulnerability is rated 7.5 on the CVSS 3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-362 (Concurrent Execution Using Shared Resource with Improper Synchronization) and CWE-663 (Use of a Non-reentrant Function in a Concurrent Context). It was published on 2026-02-19.
The vulnerability can be exploited remotely by any unauthenticated attacker over the network with low complexity and no user interaction required. Attackers can trigger concurrent activity to induce the race condition, reliably crashing the emp3r0r C2 server process and denying service to its operators. While it does not enable confidentiality or integrity impacts, the availability disruption could interrupt ongoing malicious operations managed through the C2 framework.
Mitigation is available in emp3r0r version 3.21.2, which addresses the synchronization issue. Security practitioners should upgrade to this version if using emp3r0r. Relevant resources include the fixing commit (https://github.com/jm33-m0/emp3r0r/commit/ea4d074f081dac6293f3aec38f01def5f08d5af5), release notes (https://github.com/jm33-m0/emp3r0r/releases/tag/v3.21.2), and GitHub security advisory (https://github.com/jm33-m0/emp3r0r/security/advisories/GHSA-f5p9-j34q-pwcc).
Details
- CWE(s)