Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux Kernel ksmbd Filesystem Vulnerability Exploited

Posted on October 9, 2025October 9, 2025 By CWS

Safety researchers have launched a full proof-of-concept (PoC) exploit for a high-severity vulnerability within the Linux kernel’s ksmbd module, demonstrating a dependable path to native privilege escalation.

The vulnerability, tracked as CVE-2025-37947, is an out-of-bounds write that may be leveraged by an authenticated native attacker to achieve full root management over a susceptible system.

This discovery, detailed by researchers at Doyensec, is the fruits of intensive vulnerability analysis into the kernel-level Server Message Block (SMB) server, which has seen elevated adoption in latest Linux variations.

The general public launch of the exploit code underscores the sensible danger posed by this flaw to techniques operating the affected kernel module.

The basis reason behind CVE-2025-37947 lies throughout the ksmbd_vfs_stream_write() perform, which is accountable for dealing with write operations to file streams utilizing prolonged attributes.

The vulnerability may be triggered by an authenticated consumer on techniques the place ksmbd is configured with a writable share and the streams_xattr VFS module is enabled.

The flaw stems from improper measurement validation when a user-supplied place and information depend surpass the XATTR_SIZE_MAX restrict of 65,536 bytes.

Though the code truncates the allocation measurement for the buffer, it fails to regulate the depend for the memcpy operation accordingly.

This logic error permits an attacker to put in writing a managed quantity of information previous the boundary of the allotted kernel buffer, resulting in reminiscence corruption in an adjoining reminiscence area.

From Bug To Root Privilege Escalation

The Doyensec researchers detailed how this out-of-bounds write primitive may be escalated right into a full root exploit on a contemporary Linux system, particularly Ubuntu 22.04.5 LTS.

The exploitation technique entails a complicated, multi-stage course of that begins with heap shaping to control the kernel’s reminiscence structure.

By fastidiously allocating and releasing kernel objects, the attackers may place a managed sufferer object, a msg_msg kernel message construction, instantly after the susceptible buffer.

The out-of-bounds write is then used to deprave the msg_msg header, making a use-after-free (UAF) situation.

This UAF primitive is subsequently used to leak kernel reminiscence addresses, bypassing Kernel Handle House Structure Randomization (KASLR).

With KASLR defeated, the attackers reuse the UAF to overwrite a perform pointer in a pipe_buffer object, hijacking the kernel’s management circulation to execute a ROP chain that grants them root privileges.

Proof-of-Idea Exploit Launched

Of their disclosure, the researchers revealed the entire native privilege escalation exploit on GitHub. This enables different safety professionals to investigate the assault and validate its impression on their techniques.

Whereas the present exploit focuses on native entry, the researchers famous that distant exploitation is considerably tougher, as it might doubtless require a separate data disclosure vulnerability to defeat KASLR and make heap grooming dependable.

This discovering is a part of a broader safety audit of ksmbd by Doyensec, which has beforehand uncovered different important vulnerabilities, together with a number of unauthenticated race circumstances and reminiscence exhaustion flaws.

System directors are suggested to overview their use of ksmbd and make sure that their techniques are patched in opposition to CVE-2025-37947 as updates develop into accessible from their Linux distribution suppliers.

Cyber Consciousness Month Provide: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be part of Right this moment

Cyber Security News Tags:Exploited, Filesystem, Kernel, KSMBD, Linux, Vulnerability

Post navigation

Previous Post: Discord Says 70,000 Users Had IDs Exposed in Recent Data Breach
Next Post: All SonicWall Cloud Backup Users Had Firewall Configurations Stolen

Related Posts

Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
European Airport Disruptions Caused by Sophisticated Ransomware Attack Cyber Security News
Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
Cisco Nexus Dashboard Fabric Controller Vulnerability Allows Attackers Device Impersonate as Managed Devices Cyber Security News
Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware Cyber Security News
New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats
  • KFC Venezuela Alleged Data Breach
  • Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
  • Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
  • MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats
  • KFC Venezuela Alleged Data Breach
  • Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
  • Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
  • MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News