The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-4091

CVE-2023-4091: Samba Auth Bypass Vulnerability

CVE-2023-4091 is an authentication bypass flaw in Samba that allows SMB clients to truncate files with read-only permissions when acl_xattr module is misconfigured. This post covers technical details, affected versions, impact, and mitigation steps.

Published: February 4, 2026

CVE-2023-4091 Overview

A vulnerability was discovered in Samba that allows SMB clients to truncate files even when they only have read-only permissions. This flaw occurs when the Samba VFS module acl_xattr is configured with acl_xattr:ignore system acls = yes. The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request.

Critical Impact

Authenticated attackers with read-only permissions can destroy file contents by truncating files to zero bytes, potentially causing significant data loss and integrity issues in affected Samba deployments.

Affected Products

  • Samba (multiple versions)
  • Fedora 39
  • Red Hat Storage 3.0
  • Red Hat Enterprise Linux 8.0
  • Red Hat Enterprise Linux EUS 9.0

Discovery Timeline

  • November 3, 2023 - CVE-2023-4091 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-4091

Vulnerability Analysis

This vulnerability represents an Improper Access Control flaw (CWE-276: Incorrect Default Permissions) in Samba's handling of SMB file operations. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's internal permissions enforcement.

When the acl_xattr VFS module is configured to ignore system ACLs, Samba fails to properly validate the combination of requested access modes and create disposition flags in SMB requests. An authenticated user who should only have read access can exploit the disconnect between the access mode check (which passes for read-only) and the create disposition handling (which allows OVERWRITE operations).

The vulnerability allows low-privileged authenticated users to silently destroy file contents without any indication to administrators, making it particularly dangerous for shared file storage environments where data integrity is critical.

Root Cause

The root cause lies in the design of how Samba processes SMB file open requests when the acl_xattr:ignore system acls = yes configuration is active. The SMB protocol separates the access mode (read/write/execute permissions) from the create disposition (how to handle existing files). When Samba checks permissions for a file open operation, it validates based on the requested access mode but does not apply the same permission check to the create disposition.

This means when a client requests read-only access with an OVERWRITE create disposition, Samba:

  1. Validates that the user has read permissions (passes)
  2. Processes the OVERWRITE disposition without validating write permissions (vulnerability)

The kernel file system would normally catch this discrepancy, but with ignore system acls enabled, these kernel-level checks are bypassed entirely.

Attack Vector

The attack is network-based and requires low-privilege authentication to the Samba server. An attacker needs:

  1. Valid credentials to authenticate to the Samba share
  2. Read-only access to target files
  3. The target server configured with acl_xattr:ignore system acls = yes

The attacker constructs an SMB open request specifying read-only access mode combined with an OVERWRITE create disposition. When Samba processes this request, the file is truncated to zero bytes despite the attacker only having read permissions.

This vulnerability is particularly concerning because it allows data destruction through what appears to be a legitimate read operation, making it difficult to detect through standard access logging.

Detection Methods for CVE-2023-4091

Indicators of Compromise

  • Unexpected file truncation events where files are reduced to 0 bytes
  • SMB audit logs showing FILE_OVERWRITE or FILE_OVERWRITE_IF dispositions from users with read-only permissions
  • Sudden data loss in Samba shares where users only have read access
  • File modification timestamps changing on files that should be read-only

Detection Strategies

  • Enable detailed SMB audit logging and monitor for OVERWRITE create dispositions from non-administrative users
  • Implement file integrity monitoring (FIM) on critical Samba shares to detect unexpected file modifications
  • Review Samba configuration files for acl_xattr:ignore system acls = yes settings to identify vulnerable deployments
  • Monitor for authentication events followed by file size changes to 0 bytes

Monitoring Recommendations

  • Configure Samba's full_audit VFS module to log all file operations including create dispositions
  • Set up alerts for file truncation events on sensitive directories
  • Implement periodic file size baseline comparisons for critical data
  • Review SMB traffic logs for patterns indicating exploitation attempts

How to Mitigate CVE-2023-4091

Immediate Actions Required

  • Update Samba to the latest patched version immediately
  • Review and reconfigure any shares using acl_xattr:ignore system acls = yes to use proper system ACL enforcement
  • Audit file shares for any evidence of unauthorized file truncation
  • Consider temporarily disabling the acl_xattr module until patches are applied

Patch Information

Security patches are available from Samba and various Linux distributions. Consult the Samba Security Advisory for CVE-2023-4091 for official patch information.

Distribution-specific updates are available:

  • Red Hat: Multiple advisories including RHSA-2023:6209, RHSA-2023:6744, RHSA-2023:7371, RHSA-2023:7408, RHSA-2023:7464, and RHSA-2023:7467
  • Fedora: Updates available via the Fedora Package Announcement
  • Debian: See Debian LTS Announcement
  • NetApp: Refer to NetApp Security Advisory NTAP-20231124-0002

Workarounds

  • Remove or change the acl_xattr:ignore system acls = yes configuration option to restore kernel-level permission enforcement
  • Implement network-level access controls to limit SMB access to trusted systems only
  • Use file system-level immutable flags on critical files as an additional protection layer
  • Consider implementing Samba's veto files option to protect sensitive files from modification
bash
# Configuration example - Disable vulnerable ACL bypass in smb.conf
# Locate the share configuration and remove or comment out the vulnerable setting:
# [share_name]
#   vfs objects = acl_xattr
#   acl_xattr:ignore system acls = no  # Changed from 'yes' to 'no'

# Alternative: Remove the ignore system acls directive entirely
# and let Samba use standard kernel permission checks

# To verify current configuration:
testparm -s | grep -i "ignore system acls"

# After modifying smb.conf, restart Samba:
systemctl restart smbd

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechSamba

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.48%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-276
  • Technical References
  • Red Hat Security Advisory RHSA-2023:6209

  • Red Hat Security Advisory RHSA-2023:6744

  • Red Hat Security Advisory RHSA-2023:7371

  • Red Hat Security Advisory RHSA-2023:7408

  • Red Hat Security Advisory RHSA-2023:7464

  • Red Hat Security Advisory RHSA-2023:7467

  • Red Hat CVE-2023-4091 Details

  • Red Hat Bugzilla #2241882

  • Samba Bugzilla #15439

  • Debian LTS Announcement April 2024

  • Fedora Package Announcement

  • NetApp Security Advisory NTAP-20231124-0002
  • Vendor Resources
  • Samba Security CVE-2023-4091
  • Related CVEs
  • CVE-2025-0620: Samba Authentication Bypass Vulnerability

  • CVE-2022-32743: Samba Auth Bypass Vulnerability

  • CVE-2022-32744: Samba Auth Bypass Vulnerability

  • CVE-2024-12087: Samba Rsync Path Traversal Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English