CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
42.9%
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with
any key known to it. By encrypting forged kpasswd requests with its own
key, a user can change other users’ passwords, enabling full domain
takeover.
Author | Note |
---|---|
mdeslaur | patches for this issue in the bug for CVE-2022-2031 Fixing this in Ubuntu 18.04 LTS would require substantial code backports. We will not be fixing this issue in Ubuntu 18.04 LTS. In environments where this is of concern, we recommend updating to a more recent Ubuntu version, or disabling kpasswd if this is not passible. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | samba | < 2:4.13.17~dfsg-0ubuntu1.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | samba | < 2:4.15.9+dfsg-0ubuntu0.2 | UNKNOWN |
ubuntu | 22.10 | noarch | samba | < 2:4.16.4+dfsg-2ubuntu1 | UNKNOWN |
ubuntu | 23.04 | noarch | samba | < 2:4.16.4+dfsg-2ubuntu1 | UNKNOWN |
ubuntu | 23.10 | noarch | samba | < 2:4.16.4+dfsg-2ubuntu1 | UNKNOWN |
ubuntu | 24.04 | noarch | samba | < 2:4.16.4+dfsg-2ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | samba | < any | UNKNOWN |
ubuntu | 16.04 | noarch | samba | < any | UNKNOWN |