VYPR
Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Apr 18, 2026

CVE-2026-23303

CVE-2026-23303

Description

In the Linux kernel, the following vulnerability has been resolved:

smb: client: Don't log plaintext credentials in cifs_set_cifscreds

When debug logging is enabled, cifs_set_cifscreds() logs the key payload and exposes the plaintext username and password. Remove the debug log to avoid exposing credentials.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2026-23303 fixes a debug logging flaw in the Linux kernel's cifs_set_cifscreds() that exposed plaintext credentials.

Vulnerability

CVE-2026-23303 is an information disclosure vulnerability in the Linux kernel's implementation of CIFS (Common Internet File System) credential handling. In the function cifs_set_cifscreds(), a debug log statement printed the raw key payload, which includes the plaintext username and password when debug logging is enabled [1][2][3][4]. The official description confirms that the debug log exposes plaintext credentials [1].

Exploitation

The vulnerability can only be triggered when the kernel's debug logging level is set to display debug messages from the CIFS client code. An attacker would not need authentication to the CIFS share itself, but they would require local access to the system's kernel log (e.g., via dmesg or other log viewing utilities) where the credentials are written. This is a local information leak that does not require network access or special privileges beyond the ability to read kernel ring buffer logs.

Impact

If debug logging is enabled, any local user or process that can read the kernel log can obtain the plaintext username and password used for CIFS/SMB authentication. This could lead to unauthorized access to remote SMB shares or systems, potentially escalating a local log read into a broader compromise of network resources.

Mitigation

The fix removes the debug log statement that prints the credential payload. The patch has been applied to the stable Linux kernel branches tracked by the provided commits [1][2][3][4]. Users should update their kernel to the latest stable release from their distribution or apply the specific commit (e.g., b746a357abfb) to their kernel source. No workaround is available beyond disabling debug logging or restricting access to kernel logs via permissions.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.