Ghostwire

CVE-2026-8449: Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients...

HIGH CVSS 7.5 EPSS 0.18%

Published: May 12, 2026 | Last Modified: May 12, 2026

Description

Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients with directory creation permissions to trigger a heap out-of-bounds read and subsequent heap corruption by setting a crafted DACL with a malformed SID containing an inflated num_subauth field. Attackers can exploit this vulnerability by creating a directory, setting the malicious DACL via SMB2_SET_INFO, and creating child entries to cause kernel instability, denial of service, or potentially achieve privilege escalation to kernel code execution.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.18% (39th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (2 articles)

References