CRITICALCVE-2025-2421CVSS 9.8

Remote Code Execution in Profelis Informatics' SambaBox

翻译中…

平台

other

组件

sambabox

修复版本

5.1

AI Confidence: highNVDEPSS 0.4%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-2421 describes a Remote Code Execution (RCE) vulnerability within SambaBox, allowing for code injection. This flaw poses a significant risk as it could enable attackers to execute arbitrary code on vulnerable systems, potentially leading to complete compromise. The vulnerability impacts SambaBox versions prior to 5.1, and a patch is available in version 5.1.

影响与攻击场景翻译中…

The 'Code Injection' vulnerability in SambaBox allows an attacker to inject and execute arbitrary code on the affected system. Successful exploitation could grant the attacker complete control over the SambaBox server, enabling them to steal sensitive data, install malware, or disrupt services. Given the potential for remote code execution, the blast radius is significant, potentially impacting all services and data accessible through the SambaBox server. This vulnerability shares similarities with other code injection flaws where attackers leverage improper input validation to execute malicious commands.

利用背景翻译中…

CVE-2025-2421 was publicly disclosed on 2025-05-02. The EPSS score is pending evaluation, but given the CRITICAL CVSS score and the nature of RCE vulnerabilities, it is likely to be assessed as high probability. No public proof-of-concept exploits are currently known, but the vulnerability's severity suggests it could become a target for exploitation. Refer to the SambaBox security advisory for further details.

哪些人处于风险中翻译中…

Organizations utilizing SambaBox for file sharing and collaboration are at risk, particularly those running versions 0–5.0. Environments with limited network segmentation or those lacking robust access controls are especially vulnerable. Shared hosting environments utilizing SambaBox may also be affected, as the vulnerability could potentially impact multiple tenants.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.38% (59% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件sambabox
供应商Profelis Informatics
影响范围修复版本
0 – 5.15.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-2421 is to upgrade SambaBox to version 5.1 or later, which includes the necessary fix. If an immediate upgrade is not feasible, consider implementing temporary workarounds such as restricting network access to the SambaBox server to trusted sources only. Review and harden SambaBox configuration, paying close attention to input validation and access controls. While a direct detection signature may be difficult to create, monitor system logs for unusual process execution or network activity originating from the SambaBox server.

修复方法翻译中…

Actualice SambaBox a la versión 5.1 o posterior. La actualización corrige la vulnerabilidad de inyección de código. Consulte el anuncio de la versión 5.1 en sambabox.io para obtener más detalles.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-2421 — RCE in SambaBox?

CVE-2025-2421 is a critical Remote Code Execution vulnerability in SambaBox, allowing attackers to inject and execute code. It affects versions 0 through 5.0.

Am I affected by CVE-2025-2421 in SambaBox?

You are affected if you are running SambaBox versions 0 through 5.0. Upgrade to version 5.1 or later to mitigate the risk.

How do I fix CVE-2025-2421 in SambaBox?

Upgrade SambaBox to version 5.1 or later. If immediate upgrade is not possible, restrict network access and review configuration.

Is CVE-2025-2421 being actively exploited?

While no public exploits are currently known, the vulnerability's severity suggests it could become a target for exploitation.

Where can I find the official SambaBox advisory for CVE-2025-2421?

Refer to the official SambaBox security advisory for detailed information and mitigation guidance.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。