Researchers demonstrated remote code execution on Linux kernels by exploiting two ksmbd vulnerabilities, allowing for kernel memory read/write capabilities. This 'authenticated 0-click' exploit chains a heap overflow and out-of-bounds read to bypass security mitigations and achieve a reverse shell. While write access to an SMB share is needed, misconfigurations could enable unauthenticated attacks.
Latest mentioned: 09-16
Earliest mentioned: 09-14