CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 17, 2026

CVE-2026-6435 | rust-coreutils File Permission permission

VulDB Archived Apr 17, 2026 ✓ Full text saved

A vulnerability categorized as critical has been discovered in rust-coreutils . This affects an unknown function of the component File Permission Handler . Such manipulation leads to permission issues. This vulnerability is listed as CVE-2026-6435 . The attack must be carried out from within the local network. There is no available exploit.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-358059 · CVE-2026-6435 · GCVE-0-2026-6435 RUST-COREUTILS FILE PERMISSION PERMISSION HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 4.6 $0-$5k 4.50+ Summaryinfo A vulnerability identified as critical has been detected in rust-coreutils. This impacts an unknown function of the component File Permission Handler. Performing a manipulation results in permission. This vulnerability is cataloged as CVE-2026-6435. There is no exploit available. Detailsinfo A vulnerability, which was classified as critical, was found in rust-coreutils (affected version not known). This affects some unknown functionality of the component File Permission Handler. The manipulation with an unknown input leads to a permission vulnerability. CWE is classifying the issue as CWE-275. This is going to have an impact on confidentiality, integrity, and availability. It is possible to read the advisory at bugzilla.redhat.com. This vulnerability is uniquely identified as CVE-2026-6435. The exploitability is told to be difficult. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 04/17/2026). The attack technique deployed by this issue is T1222 according to MITRE ATT&CK. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Productinfo Name rust-coreutils CPE 2.3info 🔒 CPE 2.2info 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 4.6 VulDB Meta Temp Score: 4.6 VulDB Base Score: 4.6 VulDB Temp Score: 4.6 VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Permission CWE: CWE-275 / CWE-266 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Partially Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: no mitigation known Status: 🔍 0-Day Time: 🔒 Timelineinfo 04/17/2026 Advisory disclosed 04/17/2026 +0 days VulDB entry created 04/17/2026 +0 days VulDB entry last update Sourcesinfo Advisory: bugzilla.redhat.com Status: Not defined CVE: CVE-2026-6435 (🔒) GCVE (CVE): GCVE-0-2026-6435 GCVE (VulDB): GCVE-100-358059 Entryinfo Created: 04/17/2026 12:49 Changes: 04/17/2026 12:49 (48) Complete: 🔍 Cache ID: 99:31A:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 17, 2026
    Archived
    Apr 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗