The Badlock vulnerability is severe and likely to be exploited soon after disclosure Systems administrators should get ready to fix a critical vulnerability on April 12 that affects the Windows and Samba implementations of the Server Message Block (SMB) protocol.The vulnerability was discovered by Stefan Metzmacher, a core developer of the Samba software, which is a popular open-source implementation of the SMB/CIFS (Server Message Block/Common Internet File System) networking protocol.SMB/CIFS is implemented by default in Windows, where it’s used for network file and printer sharing. Linux and other Unix-like systems can interoperate and share resources with Windows systems over the same protocol using the Samba software.“On April 12th, 2016, SerNet, the Samba Team and Microsoft will disclose a severe bug that affects almost all versions of Microsoft Windows and Samba,” said SerNet, the company where Metzmacher works, in an announcement on its website. “The bug is called ‘Badlock’.” The company, which offers Samba consulting, support and development services, has even set up an website at badlock.org where more details will be released about the flaw on the disclosure date, which coincides with Microsoft’s Patch Tuesday — the day when Microsoft releases its monthly security updates.“Please get yourself ready to patch all systems on this day,” a warning on the badlock.org website reads. “We are pretty sure that there will be exploits soon after we publish all relevant information.” There’s been a bit of speculation on Twitter from members of the security community about where the flaw might be. The name itself seems to suggest that it’s related to the client lock-handling mechanism, and there’s actually file in the Samba source code called lock.c that has a copyright by Stefan Metzmacher.Because the vulnerability affects both Samba and Windows, which are separate implementations of the protocol, there’s a good chance that it’s actually a protocol design flaw.“With both vendors apparently offering patches, it suggests the vulnerability is either within the integration between the two vendors, the separate implementations by each vendor, or in the SMB/CIFS protocol itself (we’re betting on the latter),” said Brian Martin, director of vulnerability intelligence at security firm Risk Based Security, in a blog post.As far as the impact of the vulnerability goes, Johannes Loxen, the CEO of SerNet, said on Twitter that “#badlock means admin accounts for everyone on the same LAN.” The message appears to have since been deleted, but a CSO article on the controversy over SerNet’s use of the flaw for marketing purposes includes a screenshot of it.The disclosure of the bug’s existence, even without specific technical details, three weeks in advance has also been criticized by some members of the security community because it gives potential hackers ample time to find it on their own.“Odds on the details of Badlock leaking (or being independently discovered) before April 12th? 15/1,” said renowned security researcher David Litchfield in a Twitter message. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe