An unauthenticated attacker reachable over the network could exploit this flaw to corrupt kernel memory on Azure Linux 3.0 hosts, potentially gaining full control of affected systems. Compromised hosts in cloud or hybrid environments could expose sensitive workloads, disrupt services running on Azure Linux 3.0 infrastructure, and create a pivot point into broader network segments. If affected systems process regulated data, a successful compromise may trigger breach notification obligations and regulatory scrutiny.
You Are Affected If
You run Microsoft Azure Linux 3.0 with the azl3 kernel package at version 6.6.130.1-3
The ksmbd service is loaded and active on those hosts (confirm with 'lsmod | grep ksmbd' or 'systemctl status ksmbd')
TCP port 445 (SMB) is reachable from untrusted networks or the broader cloud environment without restricting firewall rules
You have not yet applied the April 2026 Microsoft Patch Tuesday kernel update for Azure Linux 3.0
Your vulnerability scanning or patch management pipeline does not cover Azure Linux 3.0 kernel packages
Board Talking Points
A critical flaw in a network-accessible component of our Azure Linux 3.0 servers could allow an unauthenticated attacker to take control of affected systems without requiring any user interaction.
Security and infrastructure teams should apply the April 2026 Microsoft patch to all affected Azure Linux 3.0 hosts within 72 hours, with SMB access restricted in the interim.
Without patching, any Azure Linux 3.0 host with this service exposed to the network remains a viable target for remote compromise and potential lateral movement into connected systems.