
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's ksmbd transportipc component was discovered and assigned CVE-2025-40084. The issue was disclosed on October 29, 2025, affecting the handleresponse() function which improperly handles payload size validation (NVD).
The vulnerability exists in the handle_response() function where it dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. This oversight can lead to a 4-byte read past the declared payload size when processing malformed or truncated messages from ksmbd.mountd. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Moderate) (Red Hat).
When exploited, this vulnerability can result in a buffer over-read condition, potentially leading to information disclosure or system instability. The impact is considered moderate as it requires local access and can only result in unauthorized read access beyond the intended buffer boundaries (NVD).
A fix has been implemented that validates the payload size before attempting to read the handle. This is described as a minimal fix to guard the initial handle read (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."