Vulnerability Details : CVE-2021-43566
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
Products affected by CVE-2021-43566
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-43566
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-43566
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.2
|
LOW | AV:L/AC:H/Au:N/C:N/I:P/A:N |
1.9
|
2.9
|
NIST | |
2.5
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
1.0
|
1.4
|
NIST |
CWE ids for CVE-2021-43566
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-43566
-
https://security.netapp.com/advisory/ntap-20220110-0001/
CVE-2021-43566 Samba Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://www.samba.org/samba/security/CVE-2021-43566.html
Patch;Vendor Advisory
-
https://bugzilla.samba.org/show_bug.cgi?id=13979
Exploit;Issue Tracking;Vendor Advisory
Jump to