Vulnerability Details : CVE-2017-12151
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
Products affected by CVE-2017-12151
- cpe:2.3:a:hp:cifs_server:b.04.05.11.00:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-12151
Top countries where our scanners detected CVE-2017-12151
Top open port discovered on systems with this issue
80
IPs affected by CVE-2017-12151 327,862
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-12151!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-12151
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-12151
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
Red Hat, Inc. |
CWE ids for CVE-2017-12151
-
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.Assigned by: secalert@redhat.com (Secondary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-12151
-
https://www.samba.org/samba/security/CVE-2017-12151.html
Samba - Security Announcement ArchiveMitigation;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2017:2858
RHSA-2017:2858 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151
1488197 – (CVE-2017-12151) CVE-2017-12151 samba: SMB2 connections don't keep encryption across DFS redirectsIssue Tracking;Third Party Advisory
-
https://www.debian.org/security/2017/dsa-3983
Debian -- Security Information -- DSA-3983-1 sambaThird Party Advisory
-
http://www.securitytracker.com/id/1039401
Samba Multiple Flaws Let Remote Users Hijack Connections and Remote Authenticated Users Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
HPESBUX03817 rev.2 - HP-UX CIFS Server, Local and Remote VulnerabilitiesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:2790
RHSA-2017:2790 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/100917
Samba CVE-2017-12151 Man in the Middle Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://security.netapp.com/advisory/ntap-20170921-0001/
September 2017 Samba Vulnerabilities in NetApp StorageGRID Products | NetApp Product SecurityThird Party Advisory
Jump to