Severity
7.2HIGH
EPSS
0.2%
top 56.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18
Latest updateFeb 19

Description

A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages5 packages

NVDsamba/samba4.0.04.13.14+2
Debiansamba< 2:4.13.13+dfsg-1~deb11u2+3
CVEListV5sambasamba 4.15.2, samba 4.14.10, samba 4.13.14

Also affects: Debian Linux 10.0, 9.0, Fedora 33, 34, 35, Ubuntu Linux 20.04, 21.04, 21.10, Enterprise Linux 7.0, 8.0, 8.2, 8.4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-882h-52g4-fpjv: A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication2022-02-19
CVEList
CVE-2020-25719: A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication2022-02-18
OSV
CVE-2020-25719: A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication2022-02-18

📋Vendor Advisories

4
Microsoft
A flaw was found in the way Samba as an Active Directory Domain Controller implemented Kerberos name-based authentication. The Samba AD DC could become confused about the user a ticket represents if i2022-02-08
Ubuntu
Samba vulnerabilities2021-11-11
Red Hat
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets2021-11-09
Debian
CVE-2020-25719: samba - A flaw was found in the way Samba, as an Active Directory Domain Controller, imp...2020