Platform
linux
Component
novumos
Fixed in
0.24.1
CVE-2026-40317 is a critical privilege escalation vulnerability affecting NovumOS, a custom 32-bit operating system. The vulnerability arises from insufficient validation of user-space addresses used in Syscall 12 (JumpToUser), enabling unauthorized code execution within the kernel. This flaw impacts NovumOS versions prior to 0.24, and a patch is available in version 0.24.
CVE-2026-40317 affects NovumOS, a custom 32-bit operating system written in Zig and x86 Assembly. Versions prior to 0.24 contain a critical vulnerability due to a lack of validation within Syscall 12 (JumpToUser). This syscall allows any Ring 3 user-mode process to specify an arbitrary entry point address from user-space registers. This means an attacker can manipulate this address to jump to memory locations within the kernel (Ring 0), executing code with kernel privileges. The impact is a local privilege escalation, where a user with limited permissions can gain full control of the operating system.
Exploitation of this vulnerability requires an attacker to have the ability to execute code in user mode (Ring 3) on the vulnerable NovumOS system. This could be achieved through a compromised application, another type of exploit, or even by injecting code into an existing process. Once the attacker has control over a user process, they can manipulate Syscall 12 to jump to a memory location in the kernel containing malicious code. Executing this code in the kernel context allows the attacker to perform actions that are normally restricted to administrator-level users, such as modifying system files, installing malware, or even taking full control of the system.
Exploit Status
EPSS
0.02% (6% percentile)
CISA SSVC
The definitive solution is to update NovumOS to version 0.24 or later, which patches this vulnerability. If immediate updating isn't possible, restricting syscall access is recommended. This can be achieved by implementing stricter access controls for Syscall 12, validating the user-provided entry point address and ensuring it falls within a safe range. Furthermore, reviewing and strengthening system security policies is crucial to minimize the risk of exploitation. Implementing an auditing system can help detect exploitation attempts.
Actualice NovumOS a la versión 0.24 o superior para corregir la vulnerabilidad de escalada de privilegios. Si no es posible actualizar, restrinja el acceso al sistema restringiendo el acceso a las llamadas al sistema o ejecutando el sistema en modo de usuario único sin procesos de Ring 3.
Vulnerability analysis and critical alerts directly to your inbox.
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly.
It allows for local privilege escalation, giving an unprivileged user full control of the system.
Restrict access to Syscall 12 and review your system security policies.
Check the version of NovumOS you are using. If it's prior to 0.24, it’s vulnerable.
Implement stricter access controls and consider an auditing system.
CVSS Vector
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.