The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31752

CVE-2026-31752: Linux Kernel ND Option Vulnerability

CVE-2026-31752 is an ND option validation flaw in Linux Kernel's bridge component that can cause parser issues with malformed options. This article covers technical details, affected versions, impact, and mitigation.

Published: May 7, 2026

CVE-2026-31752 Overview

CVE-2026-31752 is a Linux kernel vulnerability in the bridge subsystem's Neighbor Discovery (ND) handling code. The flaw resides in the br_nd_send() function, which walks ND options based on lengths supplied within the options themselves. A malformed ND option can cause the parser to advance beyond the computed option span or read a source link-layer address (LLADDR) option whose payload is too short to hold an Ethernet address. The fix validates option lengths against the remaining Neighbor Solicitation (NS) option area before advancing and only reads the source LLADDR when the option size is sufficient.

Critical Impact

A local attacker with low privileges can trigger out-of-bounds memory access in the kernel bridge code, leading to a denial-of-service condition that disrupts kernel availability.

Affected Products

  • Linux Kernel (multiple stable branches prior to the patched commits)
  • Linux Kernel 7.0-rc1 through 7.0-rc6 release candidates
  • Systems using the Linux bridge module with IPv6 Neighbor Discovery enabled

Discovery Timeline

  • 2026-05-01 - CVE-2026-31752 published to NVD
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-31752

Vulnerability Analysis

The vulnerability exists in br_nd_send(), a Linux kernel bridge function that constructs and processes IPv6 Neighbor Discovery messages. ND options follow a Type-Length-Value (TLV) layout where each option declares its own length in 8-byte units. The original implementation trusted these option-provided lengths without confirming they fit within the remaining option buffer.

A crafted ND packet containing malformed option lengths can cause the parser to advance past the end of the valid NS option area. Additionally, the parser could read source LLADDR option payloads that were shorter than the six bytes required for an Ethernet address. Both behaviors result in out-of-bounds memory reads inside kernel space.

The issue is categorized as a kernel input validation flaw [CWE-NVD-noinfo] affecting availability. With an EPSS score of 0.032%, active exploitation probability is currently low, but kernel-resident parsing flaws remain attractive targets.

Root Cause

The root cause is missing bounds validation in the ND option walker. The function advanced its cursor by the value of the option's length field without checking it against the remaining bytes in the option area. It also dereferenced the source LLADDR payload without confirming the option was large enough to contain a full Ethernet hardware address.

Attack Vector

Exploitation requires local access with low privileges to a system where the Linux bridge module processes IPv6 Neighbor Discovery traffic. An attacker injects a malformed Neighbor Solicitation frame with crafted option length fields onto a bridged interface. When br_nd_send() parses the frame, the malformed option triggers reads beyond the valid buffer, potentially crashing the kernel.

Review the upstream patch series at the Kernel Git Commit 259466f and the Kernel Git Commit ee02d8 for the exact validation checks introduced.

// No verified public exploit code is available for this CVE.
// See upstream stable kernel commits for the validation logic added to br_nd_send().

Detection Methods for CVE-2026-31752

Indicators of Compromise

  • Unexpected kernel oops or panic messages referencing br_nd_send or the bridge module in dmesg output
  • KASAN (Kernel Address Sanitizer) reports indicating out-of-bounds reads within the bridge ND handling code paths
  • Repeated crashes on hosts running the bridge module with IPv6 Neighbor Discovery traffic from untrusted sources

Detection Strategies

  • Monitor kernel logs for bridge-related stack traces and crash signatures originating from ND option parsing
  • Inspect bridged network traffic for malformed ND options where the declared length exceeds the remaining option buffer
  • Correlate kernel availability events with packet captures on bridge interfaces to identify malicious NS frames

Monitoring Recommendations

  • Enable persistent kernel log forwarding to a centralized log aggregation platform for retention and search
  • Track installed kernel versions across the fleet and flag hosts running unpatched kernels exposed to untrusted IPv6 segments
  • Alert on abnormal reboot patterns or systemd service restarts that correlate with bridge module load events

How to Mitigate CVE-2026-31752

Immediate Actions Required

  • Apply the upstream Linux kernel patches referenced in the eight stable Git commits published by kernel.org
  • Restrict access to bridge interfaces by removing untrusted endpoints from bridges that process IPv6 ND traffic
  • Prioritize patching on multi-tenant hosts, virtualization servers, and container platforms where local untrusted users coexist with the bridge module

Patch Information

The Linux kernel maintainers released fixes across multiple stable branches. The patches add length validation against the remaining NS option area before advancing the parser cursor and gate the source LLADDR read on a minimum option size sufficient for an Ethernet address. Relevant references include the Kernel Git Commit 82a42e, Kernel Git Commit 837392, Kernel Git Commit 850837, Kernel Git Commit c49b92, Kernel Git Commit e0bfd6, and Kernel Git Commit e71303. Distribution vendors will integrate these commits into stable kernel package updates.

Workarounds

  • Unload the bridge module on systems that do not require it using modprobe -r bridge and blacklist it in /etc/modprobe.d/
  • Disable IPv6 on bridged interfaces where ND processing is not required for operational use cases
  • Apply nftables or ebtables rules to drop malformed ND packets at the bridge layer until kernel updates can be deployed
bash
# Example: blacklist the bridge module if not in use
echo "blacklist bridge" | sudo tee /etc/modprobe.d/disable-bridge.conf
sudo modprobe -r bridge

# Verify current kernel version after patching
uname -r

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Kernel Git Commit 259466f

  • Kernel Git Commit 82a42e

  • Kernel Git Commit 837392

  • Kernel Git Commit 850837

  • Kernel Git Commit c49b92

  • Kernel Git Commit e0bfd6

  • Kernel Git Commit e71303

  • Kernel Git Commit ee02d8
  • Related CVEs
  • CVE-2026-31744: Linux Kernel NULL Pointer Vulnerability

  • CVE-2026-31746: Linux Kernel Memory Leak Vulnerability

  • CVE-2026-31738: Linux Kernel VXLAN Option Validation Flaw

  • CVE-2026-31737: Linux Kernel Memory Leak Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English