Cyber Posture

CVE-2025-10230

Critical

Published: 07 November 2025

Published
07 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0038 59.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-10230, published on 2025-11-07, is a critical command injection vulnerability (CWE-78) in Samba's front-end WINS hook handling within the Samba Active Directory Domain Controller. NetBIOS names from WINS registration packets are passed to a shell without proper validation or escaping, allowing unsanitized data to be inserted into executed shell commands. The vulnerability carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated network attacker can exploit this flaw by sending malicious WINS registration packets containing crafted NetBIOS names. Successful exploitation enables remote command execution with the privileges of the Samba process, potentially leading to full compromise of the affected domain controller.

Advisories provide guidance on mitigation, including patches from Samba and Red Hat. Refer to the Red Hat security bulletin at https://access.redhat.com/security/cve/CVE-2025-10230, the Samba security history at https://www.samba.org/samba/history/security.html, the Bugzilla entry at https://bugzilla.redhat.com/show_bug.cgi?id=2394377, and Vicarius resources for detection at https://www.vicarius.io/vsociety/posts/cve-2025-10230-detect-samba-vulnerability and mitigation at https://www.vicarius.io/vsociety/posts/cve-2025-10230-mitigate-samba-vulnerability.

Details

CWE(s)
CWE-78

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote OS command injection via crafted WINS packets enables exploitation of public-facing/remote services (T1190, T1210) leading to Unix shell execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References