7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%
A design flaw was found in Samba’s DirSync control implementation, which
exposes passwords and secrets in Active Directory to privileged users and
Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users
possessing the GET_CHANGES right to access all attributes, including
sensitive secrets and passwords. Even in a default setup, RODC DC accounts,
which should only replicate some passwords, can gain access to all domain
secrets, including the vital krbtgt, effectively eliminating the RODC / DC
distinction. Furthermore, the vulnerability fails to account for error
conditions (fail open), like out-of-memory situations, potentially granting
access to secret attributes, even under low-privileged attacker influence.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | samba | < any | UNKNOWN |
ubuntu | 20.04 | noarch | samba | < 2:4.15.13+dfsg-0ubuntu0.20.04.6 | UNKNOWN |
ubuntu | 22.04 | noarch | samba | < 2:4.15.13+dfsg-0ubuntu1.5 | UNKNOWN |
ubuntu | 23.04 | noarch | samba | < 2:4.17.7+dfsg-1ubuntu2.3 | UNKNOWN |
ubuntu | 23.10 | noarch | samba | < 2:4.18.6+dfsg-1ubuntu2.1 | UNKNOWN |
ubuntu | 24.04 | noarch | samba | < 2:4.18.6+dfsg-1ubuntu2.1 | UNKNOWN |
ubuntu | 14.04 | noarch | samba | < any | UNKNOWN |
ubuntu | 16.04 | noarch | samba | < any | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.0%