Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-28100

CVE-2023-28100: Flatpak Privilege Escalation Vulnerability

CVE-2023-28100 is a privilege escalation vulnerability in Flatpak that allows apps to inject commands on Linux virtual consoles. This article covers technical details, affected versions, impact, and mitigation.

Published: January 28, 2026

CVE-2023-28100 Overview

CVE-2023-28100 is a sandbox escape vulnerability in Flatpak, the popular system for building, distributing, and running sandboxed desktop applications on Linux. This vulnerability allows a malicious Flatpak application running on a Linux virtual console to copy text from the console and paste it into the command buffer, potentially enabling arbitrary command execution after the Flatpak app exits.

The vulnerability exploits the TIOCLINUX ioctl command, similar in nature to CVE-2017-5226 which utilized TIOCSTI. When a Flatpak app runs on virtual consoles such as /dev/tty1 or /dev/tty2, it can manipulate the terminal buffer to inject commands that may execute once the sandboxed application terminates.

Critical Impact

Malicious Flatpak applications can escape sandbox restrictions on Linux virtual consoles, potentially executing arbitrary commands with the user's privileges after the app exits.

Affected Products

  • Flatpak versions prior to 1.10.8
  • Flatpak versions prior to 1.12.8
  • Flatpak versions prior to 1.14.4
  • Flatpak versions prior to 1.15.4

Discovery Timeline

  • 2023-03-16 - CVE-2023-28100 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2023-28100

Vulnerability Analysis

This vulnerability represents an input validation error in Flatpak's sandbox implementation when running on Linux virtual consoles. The fundamental issue lies in the incomplete isolation of terminal control operations, specifically the TIOCLINUX ioctl system call.

The Flatpak sandbox is designed to restrict applications from accessing sensitive system resources, but it failed to adequately block the TIOCLINUX ioctl command. This command provides various terminal-related functionalities on Linux virtual consoles, including the ability to manipulate the selection buffer and paste content into the input stream.

The vulnerability requires local access and user privileges to execute a malicious Flatpak application. The scope is changed because the vulnerability allows escape from the sandbox container, potentially affecting resources outside the intended security boundary.

Root Cause

The root cause is improper input validation (CWE-20) in the Flatpak sandboxing mechanism. The sandbox failed to block access to the TIOCLINUX ioctl command when applications run on Linux virtual consoles (/dev/tty1, /dev/tty2, etc.). This oversight allows sandboxed applications to interact with the terminal in ways that should be restricted, enabling command injection into the parent shell's input buffer.

Graphical terminal emulators like xterm, gnome-terminal, and Konsole are unaffected because they do not implement the TIOCLINUX ioctl functionality that exists on raw Linux virtual consoles.

Attack Vector

The attack requires local access and involves the following mechanism:

  1. An attacker creates a malicious Flatpak application
  2. A user executes the application on a Linux virtual console (not a graphical terminal)
  3. The malicious app uses the TIOCLINUX ioctl to copy attacker-controlled text
  4. The app pastes this text into the terminal's command buffer
  5. After the Flatpak app exits, the injected commands remain in the buffer
  6. The user may inadvertently execute these commands when they press Enter or the commands auto-execute

The attack is specific to Linux virtual consoles and does not affect users running Flatpak applications in typical graphical environments where Wayland or X11 terminal emulators are used.

Detection Methods for CVE-2023-28100

Indicators of Compromise

  • Unexpected commands appearing in terminal history after running Flatpak applications
  • Processes spawned from shells on virtual consoles that weren't explicitly initiated by the user
  • Flatpak applications making unusual ioctl system calls to /dev/tty* devices
  • Suspicious activity logged immediately following Flatpak application termination

Detection Strategies

  • Monitor for TIOCLINUX ioctl calls originating from sandboxed Flatpak processes using auditd or similar system auditing tools
  • Implement logging of all ioctl operations to virtual console devices from containerized applications
  • Use SentinelOne's behavioral AI to detect anomalous terminal manipulation patterns from sandboxed applications
  • Audit installed Flatpak applications for untrusted or recently modified packages

Monitoring Recommendations

  • Enable kernel audit logging for ioctl system calls targeting tty devices
  • Deploy endpoint detection solutions capable of monitoring container escape attempts
  • Regularly audit Flatpak application sources and verify package integrity
  • Monitor for unexpected command execution patterns on virtual console sessions

How to Mitigate CVE-2023-28100

Immediate Actions Required

  • Upgrade Flatpak to version 1.10.8, 1.12.8, 1.14.4, or 1.15.4 depending on your current release branch
  • Avoid running Flatpak applications on Linux virtual consoles until patches are applied
  • Use graphical terminal emulators (xterm, gnome-terminal, Konsole) instead of raw virtual consoles
  • Review and audit currently installed Flatpak applications for potential malicious behavior

Patch Information

Security patches addressing this vulnerability are available in Flatpak versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. The fix restricts Flatpak applications from accessing the TIOCLINUX ioctl command, preventing sandbox escape through terminal manipulation.

The patch commit is available in the GitHub Commit Update. Additional technical details can be found in the GitHub Security Advisory.

For Gentoo Linux users, see Gentoo GLSA 202312-12 for distribution-specific guidance.

Workarounds

  • Do not run Flatpak applications on Linux virtual consoles (/dev/tty1, /dev/tty2, etc.)
  • Use Flatpak only in Wayland or X11 graphical environments where standard terminal emulators are employed
  • Restrict user access to virtual consoles on systems where Flatpak is installed
  • Consider implementing mandatory access control (SELinux/AppArmor) policies to limit ioctl access from sandboxed applications
bash
# Verify your current Flatpak version
flatpak --version

# Update Flatpak to the latest patched version
# For Debian/Ubuntu systems:
sudo apt update && sudo apt upgrade flatpak

# For Fedora systems:
sudo dnf update flatpak

# For Arch Linux:
sudo pacman -Syu flatpak

# Verify the update was successful
flatpak --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechFlatpak

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.53%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-20

  • NVD-CWE-noinfo
  • Technical References
  • OSS-Security Mailing List

  • Gentoo GLSA 202312-12
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2024-42472: Flatpak Privilege Escalation Vulnerability

  • CVE-2026-40354: Flatpak Path Traversal Vulnerability

  • CVE-2026-39977: flatpak-builder Path Traversal Flaw

  • CVE-2026-34078: Flatpak Symlink RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English