CVE-2023-4091: Incorrect Default Permissions in Red Hat Red Hat Enterprise Linux 8
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
AI Analysis
Technical Summary
CVE-2023-4091 is a vulnerability identified in the Samba implementation on Red Hat Enterprise Linux 8 systems. The flaw arises specifically when the Samba Virtual File System (VFS) module "acl_xattr" is configured with the option "acl_xattr:ignore system acls = yes". This configuration causes Samba to bypass the underlying kernel file system permission checks and rely solely on Samba's internal permission enforcement. The SMB protocol allows clients to open files with read-only access; however, if the client issues a separate OVERWRITE create disposition request, the file can be truncated to zero bytes. Due to the flawed permission enforcement in this configuration, an SMB client can exploit this behavior to truncate files even when only read-only permissions are granted. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N). The impact is primarily on file integrity, as files can be unexpectedly truncated, potentially leading to data loss or disruption of services relying on those files. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the moderate impact and ease of exploitation. No known exploits have been reported in the wild as of the publication date. This vulnerability highlights the risks of misconfigured Samba ACL settings and the importance of kernel-level permission enforcement. Organizations using RHEL 8 with Samba and the acl_xattr VFS module should audit their configurations and apply patches or mitigations promptly to prevent exploitation.
Potential Impact
The primary impact of CVE-2023-4091 is on the integrity of files shared via Samba on affected Red Hat Enterprise Linux 8 systems. An attacker with low privileges can remotely truncate files to zero bytes despite having only read-only permissions, leading to potential data loss and disruption of business operations. For European organizations, this could affect file servers, collaborative environments, and any SMB-dependent services, potentially causing operational downtime or loss of critical data. While confidentiality and availability are not directly impacted, the integrity compromise can have cascading effects, such as corrupted backups, interrupted workflows, or loss of audit trails. Organizations in sectors such as finance, healthcare, manufacturing, and government, which rely heavily on RHEL 8 and Samba for file sharing, may face increased risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially if attackers develop exploit code. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable at scale without specific conditions (the acl_xattr configuration).
Mitigation Recommendations
To mitigate CVE-2023-4091, European organizations should take the following specific actions: 1) Audit Samba configurations to identify if the VFS module "acl_xattr" is enabled with the option "acl_xattr:ignore system acls = yes". 2) Revert the configuration to respect system ACLs by setting "acl_xattr:ignore system acls = no" or removing the option if not required, ensuring kernel-level permission enforcement is active. 3) Apply the latest Red Hat patches and updates for Samba and RHEL 8 as soon as they become available to address this vulnerability. 4) Implement strict access controls and network segmentation to limit SMB access only to trusted clients and networks. 5) Monitor SMB traffic for unusual file truncation or overwrite requests that could indicate exploitation attempts. 6) Educate system administrators about the risks of misconfiguring Samba ACLs and the importance of adhering to recommended security settings. 7) Consider deploying file integrity monitoring solutions on critical file shares to detect unexpected truncation or modification events promptly. These targeted steps go beyond generic advice by focusing on the specific Samba VFS module configuration and operational monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2023-4091: Incorrect Default Permissions in Red Hat Red Hat Enterprise Linux 8
Description
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
AI-Powered Analysis
Technical Analysis
CVE-2023-4091 is a vulnerability identified in the Samba implementation on Red Hat Enterprise Linux 8 systems. The flaw arises specifically when the Samba Virtual File System (VFS) module "acl_xattr" is configured with the option "acl_xattr:ignore system acls = yes". This configuration causes Samba to bypass the underlying kernel file system permission checks and rely solely on Samba's internal permission enforcement. The SMB protocol allows clients to open files with read-only access; however, if the client issues a separate OVERWRITE create disposition request, the file can be truncated to zero bytes. Due to the flawed permission enforcement in this configuration, an SMB client can exploit this behavior to truncate files even when only read-only permissions are granted. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N). The impact is primarily on file integrity, as files can be unexpectedly truncated, potentially leading to data loss or disruption of services relying on those files. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the moderate impact and ease of exploitation. No known exploits have been reported in the wild as of the publication date. This vulnerability highlights the risks of misconfigured Samba ACL settings and the importance of kernel-level permission enforcement. Organizations using RHEL 8 with Samba and the acl_xattr VFS module should audit their configurations and apply patches or mitigations promptly to prevent exploitation.
Potential Impact
The primary impact of CVE-2023-4091 is on the integrity of files shared via Samba on affected Red Hat Enterprise Linux 8 systems. An attacker with low privileges can remotely truncate files to zero bytes despite having only read-only permissions, leading to potential data loss and disruption of business operations. For European organizations, this could affect file servers, collaborative environments, and any SMB-dependent services, potentially causing operational downtime or loss of critical data. While confidentiality and availability are not directly impacted, the integrity compromise can have cascading effects, such as corrupted backups, interrupted workflows, or loss of audit trails. Organizations in sectors such as finance, healthcare, manufacturing, and government, which rely heavily on RHEL 8 and Samba for file sharing, may face increased risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially if attackers develop exploit code. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable at scale without specific conditions (the acl_xattr configuration).
Mitigation Recommendations
To mitigate CVE-2023-4091, European organizations should take the following specific actions: 1) Audit Samba configurations to identify if the VFS module "acl_xattr" is enabled with the option "acl_xattr:ignore system acls = yes". 2) Revert the configuration to respect system ACLs by setting "acl_xattr:ignore system acls = no" or removing the option if not required, ensuring kernel-level permission enforcement is active. 3) Apply the latest Red Hat patches and updates for Samba and RHEL 8 as soon as they become available to address this vulnerability. 4) Implement strict access controls and network segmentation to limit SMB access only to trusted clients and networks. 5) Monitor SMB traffic for unusual file truncation or overwrite requests that could indicate exploitation attempts. 6) Educate system administrators about the risks of misconfiguring Samba ACLs and the importance of adhering to recommended security settings. 7) Consider deploying file integrity monitoring solutions on critical file shares to detect unexpected truncation or modification events promptly. These targeted steps go beyond generic advice by focusing on the specific Samba VFS module configuration and operational monitoring.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2023-08-02T09:43:21.439Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691f5eeb11cb603d890ffb20
Added to database: 11/20/2025, 6:33:15 PM
Last enriched: 11/20/2025, 6:37:40 PM
Last updated: 12/2/2025, 11:39:23 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13353: CWE-330 Use of Insufficiently Random Values in Cloudflare gokey
HighPersonal Information of 33.7 Million Stolen From Coupang
MediumCVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio
MediumCVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
LowCVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.