

CVE-2025-44084 – D-Link DI-8100 Vulnerability
May 22, 2025
Cisco Identity Services RADIUS Vulnerability Allows Attackers to Trigger DoS
May 22, 2025
CVE-2025-44084 – D-Link DI-8100 Vulnerability
May 22, 2025
Cisco Identity Services RADIUS Vulnerability Allows Attackers to Trigger DoS
May 22, 2025Severity
Medium
Analysis Summary
A groundbreaking moment in cybersecurity was marked by the discovery of CVE-2025-37899, a zero-day vulnerability in the Linux kernel’s ksmbd component, responsible for handling SMB3 file-sharing protocols. Identified by a security researcher using OpenAI’s o3 model, the vulnerability highlights the increasing role of AI in advanced security research. Officially confirmed on May 20, 2025, the flaw is a use-after-free bug triggered during the handling of the SMB 'logoff' command. Specifically, one thread frees the sess->user object, while another thread could access it concurrently during a session setup, leading to memory corruption and potentially arbitrary code execution with kernel-level privileges.
The vulnerability affects Linux kernel versions up to 6.12.27, 6.14.5, and 6.15-rc4, and although the Exploit Prediction Scoring System (EPSS) estimates only a 0.02% likelihood of exploitation, the issue has been rated as high severity by many experts. Distributions like SUSE have already begun developing patches, classifying the issue as "moderate severity." The community is being advised to apply updates swiftly to mitigate risks. This kind of vulnerability, if exploited, could have serious implications for systems relying on ksmbd, particularly in enterprise or cloud environments where SMB file sharing is common.
What makes this discovery particularly noteworthy is that it was achieved using only the O3 API, without agents, frameworks, or additional tooling. The researcher emphasized this as the first known case of a zero-day vulnerability found by a large language model, showcasing the AI’s capability to reason through concurrent code behavior, a task traditionally reserved for expert human researchers. OpenAI’s o3 model, released in April 2025, was designed to “think longer before responding” and has shown advanced performance in complex reasoning tasks, including multi-threaded code analysis.
This event marks a paradigm shift in vulnerability research, where human-AI collaboration is not only viable but essential. Rather than displacing experts, AI tools like o3 significantly enhance researcher productivity by accelerating code comprehension and vulnerability identification. As the Researcher pointed out, professionals in the field should embrace this evolution to stay ahead. With models now capable of parsing deep, concurrent logic in code, AI is poised to become a standard part of the exploit research process, boosting defenses before adversaries can take advantage.
Impact
- Unauthorize Access
- Code Execution
- Gain Access
Indicators of Compromise
CVE
CVE-2025-37899
Affected Vendors
Affected Products
- Linux - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Remediation
- Upgrade to the latest version of the Kernel, available from the Linux Kernel GIT Repository.
- Install the latest Linux kernel patches as soon as they are released by your Linux distribution (e.g., SUSE, Ubuntu, Red Hat).
- If your system does not require SMB file sharing, disable the ksmbd kernel module to eliminate exposure.
- Use endpoint detection and response (EDR) tools to watch for signs of memory corruption or abnormal SMB activity.
- In production environments, test kernel updates in a staging environment to ensure they don't disrupt critical services.
- Follow trusted sources like your Linux vendor’s security mailing list or CVE trackers to stay informed about patch availability.
- Implement kernel hardening tools like SELinux, AppArmor, or Grsecurity to reduce the impact of potential exploits.