CVE-2025-66003

N/A Unknown

📋 TL;DR

An External Control of File Name or Path vulnerability in smb4k's mounthelper allows local users to escalate privileges to root by controlling the contents of a Samba share. This affects smb4k users who can access and manipulate Samba shares. The vulnerability enables local privilege escalation.

💻 Affected Systems

Products:
  • smb4k
Versions: from unknown versions before 4.0.5
Operating Systems: Linux distributions with smb4k installed
Default Config Vulnerable: ⚠️ Yes
Notes: Requires smb4k with mounthelper functionality and access to Samba shares

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root access to the system, potentially compromising all data and system integrity.

🟠

Likely Case

Local user with access to a Samba share escalates to root privileges, gaining complete control over the system.

🟢

If Mitigated

If proper access controls restrict Samba share access, impact is limited to authorized users only.

🌐 Internet-Facing: LOW (requires local access to Samba shares, not directly internet exploitable)
🏢 Internal Only: HIGH (local users with Samba share access can exploit this for root access)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to control Samba share contents; exploit details not publicly documented

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.5

Vendor Advisory: https://security.opensuse.org/2025/12/10/smb4k-major-issues-in-kauth-helper.html

Restart Required: No

Instructions:

1. Update smb4k to version 4.0.5 or later using your distribution's package manager. 2. For openSUSE: 'sudo zypper update smb4k'. 3. For other distributions, use appropriate package manager commands.

🔧 Temporary Workarounds

Disable smb4k mounthelper

linux

Remove or disable the vulnerable mounthelper component

sudo chmod -x /usr/lib/smb4k/mounthelper
sudo mv /usr/lib/smb4k/mounthelper /usr/lib/smb4k/mounthelper.disabled

Restrict Samba share access

linux

Limit access to Samba shares to trusted users only

# Configure Samba share permissions in /etc/samba/smb.conf with valid users and read-only access where possible

🧯 If You Can't Patch

  • Remove smb4k completely if not needed: sudo apt remove smb4k or sudo zypper remove smb4k
  • Implement strict access controls on all Samba shares to limit potential attackers

🔍 How to Verify

Check if Vulnerable:

Check smb4k version: smb4k --version | grep -i version

Check Version:

smb4k --version

Verify Fix Applied:

Verify smb4k version is 4.0.5 or higher: smb4k --version

📡 Detection & Monitoring

Log Indicators:

  • Unusual mounthelper activity in system logs
  • Suspicious Samba share access patterns

Network Indicators:

  • Unexpected SMB traffic from local users

SIEM Query:

process.name='mounthelper' AND user.name!='root'

🔗 References

📤 Share & Export