The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-32250

CVE-2023-32250: Linux Kernel ksmbd RCE Vulnerability

CVE-2023-32250 is a remote code execution vulnerability in Linux Kernel's ksmbd SMB server caused by improper locking. Attackers can execute code in kernel context. This article covers technical details, impact, and mitigation.

Updated: May 16, 2026

CVE-2023-32250 Overview

CVE-2023-32250 is a race condition vulnerability in the Linux kernel's ksmbd component, a high-performance in-kernel Server Message Block (SMB) server. The flaw exists in the processing of SMB2_SESSION_SETUP commands and stems from missing locking when operations are performed on a shared object [CWE-362]. A remote, unauthenticated attacker can exploit this race to execute arbitrary code in the context of the Linux kernel.

Critical Impact

Successful exploitation grants kernel-level code execution from the network, fully compromising confidentiality, integrity, and availability of affected hosts.

Affected Products

  • Linux kernel versions implementing the ksmbd in-kernel SMB server
  • NetApp HCI and HCI Storage Nodes
  • NetApp H300S, H410S, H500S, and H700S hybrid storage systems

Discovery Timeline

  • 2023-07-10 - CVE-2023-32250 published to the National Vulnerability Database (NVD)
  • 2023-08-24 - NetApp publishes advisory NTAP-20230824-0004
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2023-32250

Vulnerability Analysis

The vulnerability resides in ksmbd, the kernel-mode SMB3 server introduced in recent Linux kernel releases. When ksmbd processes an SMB2_SESSION_SETUP request, it manipulates session-related objects without holding the appropriate lock. Concurrent SMB2 session setup requests can therefore reach the same object simultaneously, producing inconsistent state during the authentication handshake.

Because ksmbd executes inside the kernel, any memory corruption or use-after-free triggered through this race translates directly into kernel-context primitives. The attack complexity is elevated because the attacker must reliably win the race between competing requests, which explains the elevated complexity rating despite the network attack surface.

The issue is classified under [CWE-362] (Concurrent Execution using Shared Resource with Improper Synchronization). The Zero Day Initiative tracked this finding as advisory ZDI-23-698.

Root Cause

The root cause is the absence of proper mutex or spinlock protection around shared session objects manipulated during SMB2_SESSION_SETUP processing. When two threads service overlapping session setup commands targeting the same object, one thread can free or modify state that the other still references, creating a window for memory corruption.

Attack Vector

Exploitation requires network reachability to a host with ksmbd enabled and listening on TCP port 445. No authentication or user interaction is required, as the race occurs in the session setup path that precedes credential validation. An attacker sends concurrent crafted SMB2_SESSION_SETUP requests to trigger the race and corrupt kernel memory, ultimately pivoting to arbitrary kernel code execution.

No public proof-of-concept code or exploit modules have been published. Refer to the Zero Day Initiative Advisory ZDI-23-698 for additional technical context.

Detection Methods for CVE-2023-32250

Indicators of Compromise

  • Unexpected ksmbd worker thread crashes, kernel oops messages, or BUG: entries in dmesg referencing session setup paths.
  • Anomalous bursts of concurrent SMB2 SESSION_SETUP requests from a single remote source to TCP port 445.
  • Unexplained kernel panics or reboots on Linux hosts exposing ksmbd to untrusted networks.

Detection Strategies

  • Monitor kernel logs for crashes, list corruption warnings, or KASAN reports involving ksmbd_session, smb2_sess_setup, or related symbols.
  • Inspect SMB traffic for unusually high rates of session setup attempts from the same client, particularly without successful authentication completion.
  • Track running kernel versions against vendor-supplied fixed versions to identify hosts still exposed to the flaw.

Monitoring Recommendations

  • Alert on any process or service binding to port 445 on systems where SMB serving is not an approved function.
  • Forward kernel ring buffer and auditd records to a centralized log platform for correlation across hosts.
  • Continuously validate that ksmbd modules are unloaded on systems that do not require an SMB server role.

How to Mitigate CVE-2023-32250

Immediate Actions Required

  • Apply the patched Linux kernel from your distribution vendor; consult the Red Hat CVE-2023-32250 Advisory for Red Hat-based systems.
  • For NetApp systems, apply updates per NetApp Security Advisory NTAP-20230824-0004.
  • Restrict inbound TCP/445 access to trusted management networks using host and perimeter firewalls.
  • Disable ksmbd on any host that does not require an in-kernel SMB server.

Patch Information

Upstream Linux maintainers committed fixes to the ksmbd session setup path that introduce proper locking around the affected object operations. Distribution-specific backports are available from Red Hat, NetApp, and other Linux vendors; consult the Red Hat Bugzilla Report #2208849 for build references and fixed package versions.

Workarounds

  • Unload the ksmbd kernel module with modprobe -r ksmbd and blacklist it where SMB serving is not needed.
  • Use Samba's userspace smbd instead of ksmbd until the kernel patch is applied, reducing exposure to in-kernel SMB parsing flaws.
  • Block TCP/445 ingress at the network edge and limit SMB exposure to VPN or management segments only.
bash
# Configuration example: disable and blacklist the ksmbd module
sudo systemctl stop ksmbd.service 2>/dev/null || true
sudo modprobe -r ksmbd
echo 'blacklist ksmbd' | sudo tee /etc/modprobe.d/disable-ksmbd.conf

# Restrict SMB exposure with nftables (example)
sudo nft add rule inet filter input tcp dport 445 drop

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-362
  • Technical References
  • Red Hat CVE-2023-32250 Advisory

  • NetApp Security Advisory NTAP-20230824-0004

  • Zero Day Initiative Advisory ZDI-23-698
  • Vendor Resources
  • Red Hat Bugzilla Report #2208849
  • Related CVEs
  • CVE-2023-32258: Linux Kernel ksmbd RCE Vulnerability

  • CVE-2023-32257: Linux Kernel ksmbd RCE Vulnerability

  • CVE-2023-32254: Linux Kernel ksmbd RCE Vulnerability

  • CVE-2022-25265: Linux Kernel RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English