CVE-2026-23303
Description
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Don't log plaintext credentials in cifs_set_cifscreds
When debug logging is enabled, cifs_set_cifscreds() logs the key payload and exposes the plaintext username and password. Remove the debug log to avoid exposing credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-23303 fixes a debug logging flaw in the Linux kernel's cifs_set_cifscreds() that exposed plaintext credentials.
Vulnerability
CVE-2026-23303 is an information disclosure vulnerability in the Linux kernel's implementation of CIFS (Common Internet File System) credential handling. In the function cifs_set_cifscreds(), a debug log statement printed the raw key payload, which includes the plaintext username and password when debug logging is enabled [1][2][3][4]. The official description confirms that the debug log exposes plaintext credentials [1].
Exploitation
The vulnerability can only be triggered when the kernel's debug logging level is set to display debug messages from the CIFS client code. An attacker would not need authentication to the CIFS share itself, but they would require local access to the system's kernel log (e.g., via dmesg or other log viewing utilities) where the credentials are written. This is a local information leak that does not require network access or special privileges beyond the ability to read kernel ring buffer logs.
Impact
If debug logging is enabled, any local user or process that can read the kernel log can obtain the plaintext username and password used for CIFS/SMB authentication. This could lead to unauthorized access to remote SMB shares or systems, potentially escalating a local log read into a broader compromise of network resources.
Mitigation
The fix removes the debug log statement that prints the credential payload. The patch has been applied to the stable Linux kernel branches tracked by the provided commits [1][2][3][4]. Users should update their kernel to the latest stable release from their distribution or apply the specific commit (e.g., b746a357abfb) to their kernel source. No workaround is available beyond disabling debug logging or restricting access to kernel logs via permissions.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/2ef0fc3bf49db2b9df36d5f44508c9e384bfa2a1nvd
- git.kernel.org/stable/c/2f37dc436d4e61ff7ae0b0353cf91b8c10396e4dnvd
- git.kernel.org/stable/c/3990f352bb0adc8688d0949a9c13e3110570eb61nvd
- git.kernel.org/stable/c/3e182701db612ddd794ccd5ed822e6cc1db2b972nvd
- git.kernel.org/stable/c/54c570de9a35860dfa85fe668f23ddfda8cc7e26nvd
- git.kernel.org/stable/c/b746a357abfb8fdb0a171d51ec5091e786d34be1nvd
- git.kernel.org/stable/c/e5a3b11e07b335006371915b2da47b6056c9e3bcnvd
- git.kernel.org/stable/c/ff0ece8ed04180c52167c003362284b23cf54e8dnvd
News mentions
0No linked articles in our index yet.