Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.

Project Subscriptions

Vendors Products
Katacontainers Subscribe
Kata-containers Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wwj6-vghv-5p64 Kata Container to Guest micro VM privilege escalation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-281
References
Metrics threat_severity

None

threat_severity

Important


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers
Katacontainers kata-containers
Vendors & Products Katacontainers
Katacontainers kata-containers

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.
Title Kata Container to Guest micro VM privilege escalation
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-21T04:56:32.796Z

Reserved: 2026-01-27T14:51:03.058Z

Link: CVE-2026-24834

cve-icon Vulnrichment

Updated: 2026-02-19T20:57:47.167Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-19T17:24:49.823

Modified: 2026-02-20T13:49:47.623

Link: CVE-2026-24834

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-19T15:57:50Z

Links: CVE-2026-24834 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-20T10:06:22Z

Weaknesses