Cyber Posture

CVE-2026-43055

High

Published: 01 May 2026

Published
01 May 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0005 15.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-43055 is a high-severity an unspecified weakness vulnerability in Linux Linux Kernel. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely application of the kernel patch using kzalloc_flex properly initializes aio_cmd->iocb including ki_write_stream to zero, directly preventing the bogus value and subsequent write failure DoS.

prevent

Configuring the system to least functionality by disabling unnecessary SCSI target_core_file module eliminates the vulnerable code path and exposure to crafted write commands.

prevent

Denial-of-service protections such as rate limiting or resource allocation controls on the network-exposed SCSI target mitigate availability impacts from repeated crafted write commands triggering the uninitialized memory failure.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remotely exploitable vulnerability in a Linux kernel SCSI target service (exposed over the network) that can be triggered by sending crafted commands, directly enabling exploitation of a public-facing application for denial of service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: scsi: target: file: Use kzalloc_flex for aio_cmd The target_core_file doesn't initialize the aio_cmd->iocb for the ki_write_stream. When a write command fd_execute_rw_aio() is executed, we may get a bogus ki_write_stream value,…

more

causing unintended write failure status when checking iocb->ki_write_stream > max_write_streams in the block device. Let's just use kzalloc_flex when allocating the aio_cmd and let ki_write_stream=0 to fix this issue.

Deeper analysisAI

CVE-2026-43055 is a vulnerability in the Linux kernel's SCSI target file implementation (target_core_file). The issue arises because aio_cmd->iocb is not initialized for the ki_write_stream field. During execution of a write command via fd_execute_rw_aio(), this results in a bogus ki_write_stream value, which triggers an unintended write failure status when the block device checks if iocb->ki_write_stream exceeds max_write_streams. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to availability impact.

A remote unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending crafted write commands to a system running the affected SCSI target code, the attacker can trigger the uninitialized value check, causing write operations to fail and potentially leading to a denial of service on the target system.

The provided references point to stable kernel patch commits that resolve the issue by switching to kzalloc_flex for aio_cmd allocation, which ensures proper zero-initialization and sets ki_write_stream to 0, preventing the bogus value and associated failure condition.

Details

CWE(s)

Affected Products

linux
linux kernel
7.0 · 6.16 — 6.18.22 · 6.19 — 6.19.12

CVEs Like This One

CVE-2026-22984Same product: Linux Linux Kernel
CVE-2026-31649Same product: Linux Linux Kernel
CVE-2026-43037Same product: Linux Linux Kernel
CVE-2026-23427Same product: Linux Linux Kernel
CVE-2026-31668Same product: Linux Linux Kernel
CVE-2026-31718Same product: Linux Linux Kernel
CVE-2026-31612Same product: Linux Linux Kernel
CVE-2026-31478Same product: Linux Linux Kernel
CVE-2026-31705Same product: Linux Linux Kernel
CVE-2026-31476Same product: Linux Linux Kernel

References