Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Samba RCE Vulnerability Enables Arbitrary Code Execution

Critical Samba RCE Vulnerability Enables Arbitrary Code Execution

Posted on October 16, 2025October 16, 2025 By CWS

Samba has disclosed a extreme distant code execution (RCE) flaw that would permit attackers to hijack Energetic Listing area controllers.

Tracked as CVE-2025-10230, the vulnerability stems from improper validation within the Home windows Web Identify Service (WINS) hook mechanism, incomes an ideal CVSS 3.1 rating of 10.0 for its ease of exploitation and devastating potential influence.

Samba, the open-source implementation of the SMB/CIFS networking protocol extensively utilized in Linux and Unix environments to imitate Home windows file sharing and authentication, has lengthy been a cornerstone for cross-platform enterprise networks.

Nonetheless, this flaw exposes organizations counting on it as an Energetic Listing Area Controller (AD DC) to unauthenticated assaults.

Found by safety researcher Igor Morgenstern of Aisle Analysis, the difficulty impacts all Samba variations since 4.0 when particular configurations are enabled, specifically, WINS help and a customized ‘wins hook’ script within the smb.conf file.

Samba RCE Vulnerability

WINS, a deprecated Microsoft protocol from the pre-DNS period, resolves NetBIOS names in legacy Home windows networks.

By default, WINS help is disabled in Samba, however when activated on an AD DC alongside the ‘wins hook’ parameter, which triggers an exterior script on identify modifications, the system turns into a sitting duck.

Attackers can ship crafted WINS identify registration requests containing shell metacharacters inside the 15-character NetBIOS restrict.

These inject arbitrary instructions into the hook script, executed by way of a shell with none authentication or consumer interplay required.

The vulnerability’s scope is slender however perilous: it solely impacts Samba in AD DC mode (roles like ‘area controller’ or ‘energetic listing area controller’).

Standalone or member servers, which use a distinct WINS implementation, stay unaffected. In apply, this might let distant risk actors on the community pivot to full system compromise, exfiltrating delicate knowledge, deploying ransomware, or escalating privileges in hybrid Home windows-Linux setups frequent in enterprises.

Mitigations

Samba maintainers acted swiftly, releasing patches to their safety portal and issuing up to date variations: 4.23.2, 4.22.5, and 4.21.9.

Directors ought to prioritize upgrades, particularly in environments with legacy WINS dependencies.

As a workaround, disable the ‘wins hook’ parameter fully or set ‘wins help = no’ in smb.conf Samba’s default configuration already avoids this dangerous combo, making most setups protected out of the field.

Consultants urge a broader overview: WINS is out of date, and its use on fashionable area controllers is uncommon and inadvisable. Even post-patch, admins would possibly disable hooks altogether, as future Samba releases may drop help.

With assault surfaces increasing in hybrid clouds, this incident underscores the necessity to audit and part out antiquated protocols earlier than they grow to be entry factors for nation-state actors or cybercriminals.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Code, Critical, Enables, Execution, RCE, Samba, Vulnerability

Post navigation

Previous Post: CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks
Next Post: F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 

Related Posts

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Cyber Security News
Rising Cyber Threats Challenge Defense Sector Security Rising Cyber Threats Challenge Defense Sector Security Cyber Security News
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication Cyber Security News
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News