CVE-2025-10230

A · A flaw was found in Multiple Products

A critical remote code execution vulnerability has been discovered in Samba, a widely used software suite.

Executive summary

A critical remote code execution vulnerability has been discovered in Samba, a widely used software suite. An unauthenticated attacker on the same network can send a malicious network packet to take complete control of the affected server, allowing for data theft, service disruption, or further attacks on the internal network. Due to the ease of exploitation and maximum possible impact, this vulnerability is rated with the highest possible severity score.

Vulnerability

This vulnerability is a command injection flaw within Samba's Windows Internet Name Service (WINS) server component. An unauthenticated attacker on the local network can send a specially crafted NetBIOS name registration request. The Samba server fails to properly sanitize the NetBIOS name from this packet before passing it to a back-end shell script for processing, allowing the attacker to inject and execute arbitrary system commands with the privileges of the Samba service, which is often root.

Business impact

This vulnerability represents a critical risk to the organization, reflected by its CVSS score of 10.0. Successful exploitation grants an attacker complete control over the affected server, resulting in a total loss of confidentiality, integrity, and availability. Potential consequences include unauthorized access to and exfiltration of sensitive data, deployment of ransomware, manipulation or destruction of critical files, and using the compromised server as a beachhead to launch further attacks against the internal network infrastructure.

Remediation

Immediate Action: The primary remediation is to apply security patches immediately. Update A flaw was found in Multiple Products to the latest version. After patching, monitor for any signs of post-exploitation activity and review historical access and system logs for indicators of compromise.

Proactive Monitoring: Security teams should monitor network traffic for malformed or unusual NetBIOS name registration packets on UDP port 137. In system logs, look for unexpected commands being executed or suspicious child processes being spawned by the Samba daemon (nmbd). Enable and centralize Samba's logs, paying close attention to WINS registration entries containing shell metacharacters (e.g., ;, $, |, `).

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Disable the WINS server functionality within the Samba configuration (smb.conf) if it is not essential for business operations.
  • Implement strict network segmentation and firewall rules to restrict access to NetBIOS ports (UDP/137, UDP/138, TCP/139, TCP/445) from untrusted network segments.
  • Deploy an Intrusion Prevention System (IPS) with updated signatures capable of detecting and blocking exploit attempts targeting this vulnerability.

Exploitation status

Public Exploit Available: true

Analyst recommendation

This vulnerability is of the highest criticality and requires immediate attention. All organizations using affected products must prioritize the deployment of the vendor-supplied patch across all vulnerable systems without delay. Although this CVE is not yet listed on the CISA KEV catalog, its CVSS 10.0 score and the availability of public exploits make it a prime candidate for future inclusion and a high-value target for attackers. If patching cannot be performed immediately, the compensating controls listed above must be implemented as an urgent temporary measure.