CVE-2023-32251 – Linux Kernel ksmbd Dictionary Attack Bypass

The following table lists the changes that have been made to the
CVE-2023-32251 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 31, 2025

    Action Type Old Value New Value
    Added Description A vulnerability has been identified in the Linux kernel’s ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of asynchronous requests. This bypass negates the intended anti-brute-force protection, potentially allowing attackers to conduct dictionary attacks more efficiently against user credentials or other authentication mechanisms.
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
    Added CWE CWE-307
    Added Reference https://access.redhat.com/security/cve/CVE-2023-32251
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2385852
    Added Reference https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b096d97f47326b1e2dbdef1c91fab69ffda54d17
    Added Reference https://www.zerodayinitiative.com/advisories/ZDI-23-699/
Share the Post:

Related Posts