Over 48 Cisco Firewalls Exposed to Actively Exploited Zero-Day Vulnerability
October 2, 2025Over 48 Cisco Firewalls Exposed to Actively Exploited Zero-Day Vulnerability
October 2, 2025Severity
High
Analysis Summary
A severe vulnerability has been identified in the Linux kernel’s ksmbd SMB server implementation, tracked as CVE-2025-38561 with a CVSS score of hgh. The flaw stems from improper handling of the Preauth_HashValue field in the smb2_sess_setup function, where inadequate locking during concurrent operations creates a race condition. This issue allows authenticated remote attackers to manipulate kernel memory structures and potentially execute arbitrary code within the kernel context, elevating the risk of full system compromise.
The vulnerability is particularly dangerous because ksmbd operates directly in kernel space, unlike traditional Samba implementations that run in user space. Exploitation of this flaw could grant attackers kernel-level privileges, giving them near-total control over an affected system. However, the attack requires initial authentication, meaning an adversary must already possess valid SMB credentials or gain access through other means before triggering the vulnerability. Once authenticated, attackers can exploit the race condition during SMB2 session setup, leading to memory corruption and redirection of code execution flow.
Researcher responsibly disclosed the issue to Linux maintainers on July 22, 2025, and it has since been patched in the stable kernel tree under commit 44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6. The vulnerability affects Linux systems utilizing ksmbd for file-sharing services, making it critical for organizations to patch immediately, especially on servers exposed to untrusted networks or external users. The exploit prerequisites limit its use to authenticated attackers, but the potential impact of remote code execution with kernel privileges makes this a high-severity threat.
To mitigate risk, administrators should update Linux kernels to patched versions without delay and, where possible, temporarily disable ksmbd services on non-critical systems until updates are applied. Additional defensive measures include enforcing strict authentication policies, network segmentation, and continuous monitoring of suspicious SMB traffic patterns. These steps can significantly reduce exposure to this vulnerability while ensuring business continuity for environments that depend on SMB-based file sharing.
Impact
- Gain Access
Indicators of Compromise
CVE
CVE-2025-38561
Remediation
- Update to the latest Linux kernel version containing the fix (commit 44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6).
- Temporarily turn off ksmbd services on systems where SMB functionality is not critical until patching is completed.
- Restrict ksmbd exposure by isolating SMB servers from untrusted networks and limiting access to trusted hosts only.
- Require strong, unique SMB credentials and implement multi-factor authentication where possible.
- Continuously monitor for suspicious SMB patterns, brute-force attempts, or anomalous authentication activity.
- Restrict ksmbd access to necessary users and disable unused SMB accounts/services.
- Ensure logging and alerting are enabled for SMB-related events to quickly detect potential exploitation attempts.