#VU65820 Security restrictions bypass in Samba


Published: 2022-07-27 | Updated: 2023-04-21

Vulnerability identifier: #VU65820

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-2031

CWE-ID: CWE-264

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Samba
Server applications / Directory software, identity management

Vendor: Samba

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the way the KDC kpasswd service handles password change requests. A remote user can escalate privileges on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Samba: 4.16.0 - 4.16.3, 4.15.0 - 4.15.8, 4.14.0 - 4.14.13, 4.13.0 - 4.13.17, 4.12.0 - 4.12.15, 4.11.0 - 4.11.17, 4.10.0 - 4.10.18, 4.9.0 - 4.9.18, 4.8.0 - 4.8.12, 4.7.0 - 4.7.12, 4.6.0 - 4.6.16, 4.5.0 - 4.5.16, 4.4.0 - 4.4.16, 4.3.0 - 4.3.13, 4.2.0 - 4.2.14, 4.1.0 - 4.1.23, 4.0.0 - 4.0.26, 1.9.16 - 1.9.18, 3.6.0 - 3.6.25, 3.5 - 3.5.22, 3.1 - 3.1.0, 3.4 - 3.4.17, 2.2 - 2.2a, 3.3 - 3.3.16, 3.0 - 3.0.37, 3.2 - 3.2.15, 2.18.3, 2.0 - 2.0.10


External links
http://www.samba.org/samba/security/CVE-2022-2031.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability