Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.
History

Thu, 19 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.
Title Kata Container to Guest micro VM privilege escalation
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T15:57:50.691Z

Reserved: 2026-01-27T14:51:03.058Z

Link: CVE-2026-24834

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-19T17:24:49.823

Modified: 2026-02-19T17:24:49.823

Link: CVE-2026-24834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.