CVE Vulnerabilities

CVE-2022-2031

Authentication Bypass Using an Alternate Path or Channel

Published: Aug 25, 2022 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.8 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each others tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
SambaSamba*4.14.14 (excluding)
SambaSamba4.15.0 (including)4.15.9 (excluding)
SambaSamba4.16.0 (including)4.16.4 (excluding)
SambaUbuntubionic*
SambaUbuntudevel*
SambaUbuntuesm-infra-legacy/trusty*
SambaUbuntuesm-infra/bionic*
SambaUbuntuesm-infra/focal*
SambaUbuntuesm-infra/xenial*
SambaUbuntufocal*
SambaUbuntuimpish*
SambaUbuntujammy*
SambaUbuntukinetic*
SambaUbuntulunar*
SambaUbuntumantic*
SambaUbuntunoble*
SambaUbuntuoracular*
SambaUbuntuplucky*
SambaUbuntuquesting*
SambaUbuntutrusty/esm*

Potential Mitigations

References