CVE-2025-38501

5.5 MEDIUM

📋 TL;DR

The Linux kernel's ksmbd SMB server component allows repeated connections from clients with the same IP address to exhaust maximum connection limits, potentially causing denial of service by preventing legitimate client connections. This affects Linux systems running ksmbd with default configurations. The vulnerability requires network access to the SMB service.

💻 Affected Systems

Products:
  • Linux kernel with ksmbd module
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with ksmbd enabled
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where ksmbd (kernel SMB server) is enabled and running. Many distributions don't enable ksmbd by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of SMB service to legitimate clients due to connection exhaustion from a malicious actor repeatedly connecting from a single IP address.

🟠

Likely Case

Degraded SMB service availability during connection storms or targeted attacks, affecting file sharing and network resource access.

🟢

If Mitigated

Minimal impact with proper network segmentation, connection rate limiting, or the patch applied.

🌐 Internet-Facing: MEDIUM - SMB services exposed to the internet could be targeted for DoS, but SMB should generally not be internet-facing.
🏢 Internal Only: MEDIUM - Internal attackers or misconfigured clients could disrupt SMB services within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to ksmbd service and ability to establish multiple connections. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 6073afe64510c302b7a0683a01e32c012eff715d, 7e5d91d3e6c62a9755b36f29c35288f06c3cd86b, cb092fc3a62972a4aa47c9fe356c2c6a01cd840b, e6bb9193974059ddbb0ce7763fa3882bd60d4dc3, or f1ce9258bcbce2491f9f71f7882b6eed0b33ec65

Vendor Advisory: https://git.kernel.org/stable/c/6073afe64510c302b7a0683a01e32c012eff715d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify ksmbd module loads correctly.

🔧 Temporary Workarounds

Disable ksmbd module

linux

Prevent loading of ksmbd kernel module if not required

echo 'blacklist ksmbd' >> /etc/modprobe.d/blacklist-ksmbd.conf
rmmod ksmbd

Implement network-level connection limiting

linux

Use firewall rules to limit connections per IP to ksmbd port

iptables -A INPUT -p tcp --dport 445 -m connlimit --connlimit-above 10 --connlimit-mask 32 -j REJECT

🧯 If You Can't Patch

  • Restrict network access to ksmbd service using firewall rules to trusted IPs only
  • Monitor connection rates and implement alerting for abnormal connection patterns from single IPs

🔍 How to Verify

Check if Vulnerable:

Check if ksmbd module is loaded: lsmod | grep ksmbd. If loaded and kernel version predates fix commits, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and ksmbd module loads without errors.

📡 Detection & Monitoring

Log Indicators:

  • High frequency of connection attempts from single IP in ksmbd logs
  • Connection limit warnings or errors in system logs

Network Indicators:

  • Abnormally high number of TCP connections to port 445 from single source IP
  • Failed connection attempts after reaching limits

SIEM Query:

source_ip COUNT BY dest_port WHERE dest_port=445 AND protocol=TCP GROUP BY source_ip HAVING COUNT > threshold

🔗 References

📤 Share & Export