【資安漏洞預警】Samba存在高風險安全漏洞(CVE-2025-10230),請儘速確認並進行修補
[Security Vulnerability Alert] Samba has a high-risk security vulnerability (CVE-2025-10230). Please confirm and patch it as soon as possible.

發布單位:圖資處數位服務組
日期範圍:2025/11/13 ~ 2026/5/13
 
發布單位:圖資處數位服務組
日期範圍:2025/11/13 ~ 2026/5/13
行政 行政公告
全體

轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202511-00000079

[內容說明]
研究人員發現Samba存在作業系統指令注入漏洞(OS Command Injection)漏洞(CVE-2025-10230),若使用者架設Samba AD Domain Controller伺服器並啟用WINS協定支援,未經身分鑑別之遠端攻擊者可注入任意作業系統指令於Samba伺服器上執行。

[影響平台]
Samba 4.21.9(不含)以前版本
Samba 4.22.0至4.22.5(不含)版本
Samba 4.23.0至4.23.2(不含)版本

[建議措施]
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下: https://www.samba.org/samba/history/security.html

[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-10230
2. https://www.samba.org/samba/security/CVE-2025-10230.html
3. https://www.samba.org/samba/history/security.html

Forwarded from National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202511-00000079

[Content Description]
Researchers have discovered an OS Command Injection vulnerability (CVE-2025-10230) in Samba. If a user sets up a Samba AD Domain Controller server and enables WINS protocol support, an unauthenticated remote attacker can inject arbitrary operating system commands into the Samba server for execution.

[Affected Platforms]
Samba versions prior to 4.21.9
Samba versions 4.22.0 to 4.22.5
Samba versions 4.23.0 to 4.23.2

[Recommended Actions]
The official patch has been released. Please refer to the official documentation for updates. The URL is as follows: https://www.samba.org/samba/history/security.html

[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-10230
2. https://www.samba.org/samba/security/CVE-2025-10230.html
3. https://www.samba.org/samba/history/security.html


相關附件
Top↑