CVE-2025-10230OS Command Injection in Samba

Severity
10.0CRITICALNVD
EPSS
0.4%
top 40.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 7

Description

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0

Affected Packages3 packages

debiandebian/samba< samba 2:4.17.12+dfsg-0+deb12u3 (bookworm)
Debiansamba/samba< 2:4.17.12+dfsg-0+deb12u3+2
Ubuntusamba/samba< 2:4.15.13+dfsg-0ubuntu1.10+6

🔴Vulnerability Details

4
GHSA
GHSA-88qg-f543-x242: A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validatio2025-11-07
OSV
CVE-2025-10230: A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validatio2025-11-07
OSV
samba vulnerabilities2025-10-20
OSV
samba vulnerabilities2025-10-16

📋Vendor Advisories

4
Ubuntu
Samba vulnerabilities2025-10-20
Ubuntu
Samba vulnerabilities2025-10-16
Red Hat
samba: Command Injection in WINS Server Hook Script2025-10-15
Debian
CVE-2025-10230: samba - A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names fr...2025