
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-57632 affects libsmb2 versions 6.2 and above, discovered on September 25, 2025. The vulnerability is a buffer overflow issue in the SMB2 protocol implementation that affects the processing of chained PDUs (Protocol Data Units) (NVD, GitHub POC).
The vulnerability exists in the SMB2 chained PDU processing where libsmb2 repeatedly calls smb2_add_iovector() to append to a fixed-size iovec array without checking the upper bound of v->niov (SMB2_MAX_VECTORS=256). Additionally, the SMB2_OPLOCK_BREAK path bypasses message ID validation, increasing the vulnerability's exploitability. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can allow attackers to perform heap out-of-bounds writes through crafted responses with many chained PDUs, leading to memory corruption, system crashes, and potentially arbitrary code execution. The attack can be executed remotely without requiring authentication (GitHub POC).
The vulnerability has been fixed in the libsmb2 repository through commits that implement proper bounds checking. Users should update to the patched version when available (Libsmb2 Repository).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."