CVE-2016-2124

Severity
5.9MEDIUM
EPSS
0.7%
top 28.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18
Latest updateFeb 19

Description

A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages11 packages

NVDsamba/samba3.0.04.13.14+2
Debiansamba< 2:4.13.13+dfsg-1~deb11u2+3
Ubuntusamba< 2:4.7.6+dfsg~ubuntu-0ubuntu2.26+1
CVEListV5sambasamba 4.15.2, samba 4.14.10, samba 4.13.14
NVDredhat/openstack13, 16.1, 16.2+2

Also affects: Debian Linux 10.0, 9.0, Fedora 33, 34, 35, Ubuntu Linux 18.04, 20.04, 21.04, 21.10, Enterprise Linux 7.0, 8.0, 8.2, 8.4

Patches

🔴Vulnerability Details

8
GHSA
GHSA-p5c7-5xj7-x9vv: A flaw was found in the way samba implemented SMB1 authentication2022-02-19
OSV
CVE-2016-2124: A flaw was found in the way samba implemented SMB1 authentication2022-02-18
CVEList
CVE-2016-2124: A flaw was found in the way samba implemented SMB1 authentication2022-02-18
OSV
samba regression2021-12-13
OSV
samba regression2021-12-13

📋Vendor Advisories

5
Microsoft
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.2022-02-08
Ubuntu
Samba vulnerabilities2021-12-06
Ubuntu
Samba vulnerabilities2021-11-11
Red Hat
samba: SMB1 client connections can be downgraded to plaintext authentication2021-11-09
Debian
CVE-2016-2124: samba - A flaw was found in the way samba implemented SMB1 authentication. An attacker c...2016