Cyber Posture

CVE-2026-31536

Critical

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 16.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31536 is a critical-severity an unspecified weakness vulnerability in Linux Linux Kernel. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching of the Linux kernel flaw in SMB server send completion handling to prevent exploitation of CVE-2026-31536.

preventdetect

Vulnerability scanning identifies systems with vulnerable kernel versions exposing the SMB/RDMA flaw for prioritized remediation.

detect

System monitoring detects indicators of exploitation such as anomalous SMB Direct traffic or kernel crashes from mishandled RDMA completions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Remote unauthenticated RCE in Linux kernel SMBDirect server (public-facing network service) directly enables T1190 (Exploit Public-Facing Application) and T1210 (Exploitation of Remote Services).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set.…

more

If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.

Deeper analysisAI

CVE-2026-31536 is a critical vulnerability in the Linux kernel's SMB server component, specifically affecting the handling of send completions in smbdirect_send_batch processing. The issue arises because requests without the IB_SEND_SIGNALED flag are not properly managed by the send_done function and are instead destroyed based on the final request that has the flag set. Additionally, when a connection is broken, all requests are signaled regardless of the explicit IB_SEND_SIGNALED setting, leading to potential mishandling. This flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation could result in high impacts to confidentiality, integrity, and availability, potentially allowing arbitrary code execution, data corruption, or denial of service on affected systems running vulnerable Linux kernel versions with SMB server functionality enabled.

Mitigation involves applying the relevant kernel patches referenced in the stable kernel repository, including commits 24082642654f3e5149913946e89c00a297a8868f, 9da82dc73cb03e85d716a2609364572367a5ff47, and e38b415c024bc3b6321bf8650dbf3f4aab8e74b3. Security practitioners should update to a patched kernel version as soon as possible, particularly for systems exposing SMB services over RDMA such as InfiniBand.

Details

CWE(s)

Affected Products

linux
linux kernel
5.15 — 6.18.11 · 6.19 — 6.19.1

CVEs Like This One

CVE-2026-31669Same product: Linux Linux Kernel
CVE-2026-31608Same product: Linux Linux Kernel
CVE-2026-31501Same product: Linux Linux Kernel
CVE-2026-31633Same product: Linux Linux Kernel
CVE-2026-31609Same product: Linux Linux Kernel
CVE-2026-31659Same product: Linux Linux Kernel
CVE-2026-31444Same product: Linux Linux Kernel
CVE-2026-23428Same product: Linux Linux Kernel
CVE-2026-31533Same product: Linux Linux Kernel
CVE-2026-43055Same product: Linux Linux Kernel

References