Advisory

Critical macOS SMBClient flaws enable remote code execution

Take action: Another reason to update to macOS Sequoia 15.4. In the meantime, disable SMB services if you don't need file sharing, and avoid clicking smb:// links from untrusted sources until you've patched.


Learn More

Security researchers from Supernetworks are reporting three vulnerabilities affecting macOS SMBClient that enable remote code execution, system crashes, and unauthorized process termination with minimal user interaction. 

Starting with macOS Big Sur, SMB has become the preferred file sharing protocol, making it a relevant attack surface in macOS deployments.

Vulnerabilities summary

  • CVE-2025-24269 (CVSS score 9.8) - Missing validation of compress_len field from network packets during SMB2 chained compression processing. A malicious SMB server can send crafted packets with unchecked compress_len values, causing remote code execution in kernel context.
  • CVE-2025-24235 (CVSS score 5.5) - The flaw is part of the Kerberos Helper library used during SMB authentication. A malicious SMB server can trigger authentication failure causing control flow to jump to the vulnerable library, and cause remote code execution.
  • (No CVE assigned)  - This flaw is a missing permission validation in the smbfs kernel module, and can cause local denial of service through unauthorized process termination.

Apple has addressed all three vulnerabilities in macOS Sequoia 15.4, released on March 31, 2025. The fixes include input validation improvements for the SMB packet processing function to prevent memory overflow conditions. 

Organizations should prioritize the deployment of macOS Sequoia 15.4 and review SMB network configurations to minimize exposure. Users should disable SMB services if not required and exercise caution when following smb:// links from untrusted sources until patches are applied.

Critical macOS SMBClient flaws enable remote code execution