CVE-2025-66002

N/A Unknown

📋 TL;DR

This CVE describes an argument injection vulnerability in smb4k's mount helper that allows local users to perform arbitrary unmounts. Attackers can manipulate command arguments to unmount unintended filesystems. Only affects systems with smb4k installed and local user access.

💻 Affected Systems

Products:
  • smb4k
Versions: Versions prior to smb4k 3.2.2
Operating Systems: Linux distributions with smb4k package
Default Config Vulnerable: ⚠️ Yes
Notes: Requires smb4k with kauth helper functionality enabled. Primarily affects SUSE/openSUSE distributions but may affect other Linux distributions packaging smb4k.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to denial of service by unmounting critical system filesystems, potentially causing system instability or data loss.

🟠

Likely Case

Local users unmounting SMB shares or other filesystems they shouldn't have access to, causing service disruption.

🟢

If Mitigated

Limited to unmount operations only, no arbitrary code execution or data theft capabilities.

🌐 Internet-Facing: LOW - Requires local user access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users can disrupt SMB services and potentially affect system stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access and knowledge of the vulnerability. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: smb4k 3.2.2

Vendor Advisory: https://security.opensuse.org/2025/12/10/smb4k-major-issues-in-kauth-helper.html

Restart Required: No

Instructions:

1. Update smb4k package using your distribution's package manager. 2. For openSUSE/SUSE: 'sudo zypper update smb4k'. 3. For other distributions, check your package manager for smb4k 3.2.2 or later.

🔧 Temporary Workarounds

Disable kauth helper

linux

Temporarily disable the vulnerable kauth helper component

sudo chmod -x /usr/lib/smb4k/kauth/helper

Remove smb4k

linux

Uninstall smb4k if not required

sudo zypper remove smb4k
sudo apt remove smb4k

🧯 If You Can't Patch

  • Restrict local user access to systems with smb4k installed
  • Implement strict privilege separation and monitor for unmount operations

🔍 How to Verify

Check if Vulnerable:

Check smb4k version: 'smb4k --version' or 'rpm -q smb4k' or 'dpkg -l smb4k'

Check Version:

smb4k --version

Verify Fix Applied:

Verify installed version is 3.2.2 or higher: 'smb4k --version | grep -q "3\.[2-9]\|4\."'

📡 Detection & Monitoring

Log Indicators:

  • Unusual unmount operations in system logs
  • Failed unmount attempts with unexpected arguments

Network Indicators:

  • Unexpected SMB share disconnections

SIEM Query:

process.name="smb4k" AND command_line CONTAINS "unmount" AND NOT command_line CONTAINS expected_share_name

🔗 References

📤 Share & Export