The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23220

CVE-2026-23220: Linux Kernel ksmbd DOS Vulnerability

CVE-2026-23220 is a denial of service flaw in Linux kernel ksmbd that causes infinite loops during signature verification failures. This post explains the technical details, affected versions, impact, and mitigation.

Published: February 20, 2026

CVE-2026-23220 Overview

CVE-2026-23220 is a Denial of Service vulnerability in the Linux kernel's ksmbd (kernel SMB server) component. The vulnerability occurs when a signed SMB2 request fails signature verification, causing an infinite loop due to improper handling of the next_smb2_rcv_hdr_off variable in error paths. This flaw can lead to high CPU usage and kernel log flooding, effectively causing a denial of service condition on affected systems.

Critical Impact

Attackers can trigger an infinite loop in the ksmbd module by sending malformed signed SMB2 requests, causing kernel log flooding with "bad smb2 signature" messages and sustained high CPU utilization.

Affected Products

  • Linux kernel with ksmbd module enabled
  • Systems using in-kernel SMB3 file server functionality
  • Linux distributions with ksmbd support compiled into the kernel

Discovery Timeline

  • 2026-02-18 - CVE-2026-23220 published to NVD
  • 2026-02-19 - Last updated in NVD database

Technical Details for CVE-2026-23220

Vulnerability Analysis

This vulnerability represents a critical flaw in the error handling logic of the ksmbd module's SMB2 request processing chain. When the kernel SMB server receives a chained SMB2 request that requires signature verification, the check_sign_req() function validates the cryptographic signature. Upon signature verification failure, the set_smb2_rsp_status() function is invoked to return a STATUS_ACCESS_DENIED error to the client.

The root issue lies in how set_smb2_rsp_status() resets the work->next_smb2_rcv_hdr_off variable to zero as a side effect. This offset pointer is critical for tracking the position within chained SMB2 command sequences. When reset to zero, the kernel loses track of the current position in the command chain, causing is_chained_smb2_message() to incorrectly evaluate the same request header repeatedly.

If the original request's NextCommand field contains a non-zero value (indicating additional commands in the chain), the processing loop in __handle_ksmbd_work() never advances past the failed request. Instead, it continuously reprocesses the same malformed request, generating an endless stream of signature verification failures.

Root Cause

The vulnerability stems from improper state management during error handling in the SMB2 request processing pipeline. The set_smb2_rsp_status() function unconditionally resets next_smb2_rcv_hdr_off to zero without considering whether this invalidation would break chained message processing. The __process_request() function should have detected this error condition and returned SERVER_HANDLER_ABORT instead of SERVER_HANDLER_CONTINUE, which would properly terminate the processing loop.

Attack Vector

An attacker can exploit this vulnerability by sending specially crafted SMB2 requests to a system running the ksmbd module. The attack requires:

  1. Network access to the ksmbd service (typically TCP port 445)
  2. Crafting a chained SMB2 request with multiple commands where the NextCommand field is non-zero
  3. Intentionally providing an invalid or malformed signature for the request

When the signature verification fails, the kernel enters an infinite loop, consuming CPU resources and flooding the kernel log with error messages. This effectively creates a denial of service condition that persists until the affected process is manually terminated or the system is rebooted.

The vulnerability mechanism involves the following sequence in the ksmbd module's request processing:

  1. A signed chained SMB2 request arrives at __process_request()
  2. check_sign_req() validates the signature and returns an error for invalid signatures
  3. set_smb2_rsp_status() is called with STATUS_ACCESS_DENIED, resetting next_smb2_rcv_hdr_off to zero
  4. is_chained_smb2_message() checks if more commands exist in the chain
  5. Since NextCommand is non-zero and the offset was reset, the same header is evaluated repeatedly
  6. __handle_ksmbd_work() loops infinitely, reprocessing the failed request

For complete technical details, refer to the Linux kernel commit fixes.

Detection Methods for CVE-2026-23220

Indicators of Compromise

  • Repeated "bad smb2 signature" messages in kernel logs (dmesg or /var/log/kern.log)
  • Abnormally high CPU utilization by kernel threads associated with ksmbd
  • ksmbd worker threads consuming 100% CPU on one or more cores
  • System unresponsiveness or degraded performance on SMB file sharing services

Detection Strategies

  • Monitor kernel logs for repeated signature verification failure messages using log aggregation tools
  • Implement CPU usage alerting for kernel threads with names matching ksmbd patterns
  • Deploy network intrusion detection rules to identify malformed SMB2 chained requests
  • Use kernel tracing tools (ftrace, eBPF) to detect abnormal iteration counts in ksmbd processing functions

Monitoring Recommendations

  • Configure syslog monitoring to alert on high-frequency "bad smb2 signature" messages
  • Establish baseline CPU utilization metrics for ksmbd processes and alert on anomalies
  • Monitor network traffic patterns for unusual SMB2 request volumes or malformed packets
  • Implement kernel watchdog mechanisms to detect and recover from infinite loop conditions

How to Mitigate CVE-2026-23220

Immediate Actions Required

  • Apply the kernel patches from the official Linux kernel git repository immediately
  • If patching is not immediately possible, consider temporarily disabling the ksmbd module
  • Implement network-level access controls to restrict SMB access to trusted networks only
  • Monitor systems for signs of exploitation while awaiting patch deployment

Patch Information

The vulnerability has been resolved in the Linux kernel through multiple commits that change the return value from SERVER_HANDLER_CONTINUE to SERVER_HANDLER_ABORT when signature verification fails. This ensures the processing loop terminates immediately rather than attempting to continue from an invalidated offset.

Official patches are available from the following kernel commits:

  • Commit 5accdc5b7f28
  • Commit 71b5e7c52831
  • Commit 9135e791ec27
  • Commit f7b1c2f5642b
  • Commit fb3b66bd72de

Workarounds

  • Disable the ksmbd kernel module if not required: modprobe -r ksmbd
  • Use user-space Samba instead of ksmbd for SMB file sharing services
  • Implement firewall rules to restrict SMB (port 445) access to trusted IP ranges
  • Consider network segmentation to isolate systems running ksmbd from untrusted networks
bash
# Disable ksmbd module temporarily
sudo modprobe -r ksmbd

# Prevent ksmbd from loading on boot
echo "blacklist ksmbd" | sudo tee /etc/modprobe.d/blacklist-ksmbd.conf

# Restrict SMB access via iptables (allow only trusted network)
sudo iptables -A INPUT -p tcp --dport 445 -s 192.168.1.0/24 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 445 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update
  • Related CVEs
  • CVE-2026-23446: Linux Kernel aqc111 Driver DoS Vulnerability

  • CVE-2026-23451: Linux Kernel Bonding Driver DoS Flaw

  • CVE-2026-23460: Linux Kernel ROSE Protocol DoS Vulnerability

  • CVE-2026-23459: Linux Kernel DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English