CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
75.6%
The Samba Team reports:
CVE-2020-25717: A user in an AD Domain could become root on domain
members.
CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos
tickets issued by an RODC.
CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC
in Kerberos tickets.
CVE-2020-25721: Kerberos acceptors need easy access to stable
AD identifiers (eg objectSid).
CVE-2020-25722: Samba AD DC did not do sufficient access and
conformance checking of data stored.
CVE-2016-2124: SMB1 client connections can be downgraded to plaintext
authentication.
CVE-2021-3738: Use after free in Samba AD DC RPC server.
CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
www.samba.org/samba/security/CVE-2016-2124.html
www.samba.org/samba/security/CVE-2020-25717.html
www.samba.org/samba/security/CVE-2020-25718.html
www.samba.org/samba/security/CVE-2020-25719.html
www.samba.org/samba/security/CVE-2020-25721.html
www.samba.org/samba/security/CVE-2020-25722.html
www.samba.org/samba/security/CVE-2021-23192.html
www.samba.org/samba/security/CVE-2021-3738.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
75.6%