{"vulnerability": "CVE-2024-26581", "sightings": [{"uuid": "3b2c2ce9-2a05-4e4a-a946-65c370c716fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "32760852-c323-41e3-92a8-d4cae30df000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3lwors66m2k2g", "content": "", "creation_timestamp": "2025-08-18T16:07:42.213550Z"}, {"uuid": "0dea4e4d-d81d-4dbc-8cc0-0fc60b57558c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "820baf90-db1e-4719-8402-82d903d76a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8503", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a[CVE-2024-26581] Vulnerability Checker for BGN Internal\nURL\uff1ahttps://github.com/madfxr/CVE-2024-26581-Checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-13T08:10:18.000000Z"}, {"uuid": "6efc62c5-ff99-4421-8095-adfc51783a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0398/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "fb2d24b3-4e90-4aad-a0cf-6b0ae564fc94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12477", "content": "\u200aCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise\n\nhttps://securityonline.info/cve-2024-26581-poc-exploit-released-linux-systems-at-risk-of-root-compromise/", "creation_timestamp": "2024-09-08T17:48:03.000000Z"}, {"uuid": "50b8050a-9dad-495a-bde3-9ddcf0557f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4719", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-27T19:48:09.000000Z"}, {"uuid": "ca30c715-149a-40a5-9706-f9728205650b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/79747", "content": "\ud83d\udee0 CVE-2024-26581 Checker \ud83d\udee0\n\nThis is a script to check your kernel versions to see if you're susceptible to CVE202426581.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"Packet Storm - Tools\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2024-09-19T17:46:18.000000Z"}, {"uuid": "5c82f79e-8322-4325-94c3-153efcc0d15d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/3802", "content": "\ud83d\udea8CVE-2024-26581 Vulnerability Checker for BGN Internal\n\nhttps://darkwebinformer.com/cve-2024-26581-vulnerability-checker-for-bgn-internal/", "creation_timestamp": "2024-09-19T16:54:07.000000Z"}, {"uuid": "fcc6751e-7ab7-44d8-9850-f43d44f9edc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/460", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-26T14:26:02.000000Z"}, {"uuid": "2b8b50ec-b3b2-4aa2-8471-58de05e77698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/567", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:00:22.000000Z"}, {"uuid": "e17fba85-e44c-4ca7-abfb-1cd736f725e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/arpsyndicate/3765", "content": "#ExploitObserverAlert\n\nCVE-2024-26581\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26581. In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_set_rbtree: skip end interval element from gc  rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.", "creation_timestamp": "2024-02-21T13:26:19.000000Z"}, {"uuid": "b450c097-21d7-422e-8ade-535c4a6abc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23689", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:42.000000Z"}, {"uuid": "0be0e299-f009-459d-ac6b-6eeba9312ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188516", "content": "https://ift.tt/aBsEQxV\nCVE-2024-26581", "creation_timestamp": "2024-02-20T14:22:02.000000Z"}, {"uuid": "08b7c792-9de5-4bf1-a747-ee7d9c5ca67b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188526", "content": "https://ift.tt/aBsEQxV\nCVE-2024-26581", "creation_timestamp": "2024-02-20T14:26:23.000000Z"}, {"uuid": "200d8259-11f4-4ceb-a0f7-2f3c34220ce9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188928", "content": "https://ift.tt/ourK5HR\nCVE-2024-26581", "creation_timestamp": "2024-02-20T21:31:21.000000Z"}, {"uuid": "e7a40f02-c150-44b1-8b50-8d2ee55848d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11194", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-26T11:27:20.000000Z"}, {"uuid": "2c6f528e-9502-4493-9a89-d159f7801b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/210", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:44.000000Z"}]}