CVE-2016-2124 log

Source
Severity Medium
Remote Yes
Type Silent downgrade
Description
A security issue has been found in Samba versions 3.0.0 to 4.15.1. A man in the middle attack can force the client side SMB1 code  to fall-back to plaintext or NTLM based authentication even if Kerberos authentication was requested by the user or application.
Group Package Affected Fixed Severity Status Ticket
AVG-2539 smbclient 4.15.1-1 4.15.2-1 Medium Fixed
References
https://www.samba.org/samba/security/CVE-2016-2124.html
https://www.samba.org/samba/ftp/patches/security/samba-4.15.1-security-2021-11-09.patch
Notes
Workaround
==========

To mitigate the issue, ensure the following [global] smb.conf parameters are set to their default values as shown below:

  client lanman auth = no
  client NTLMv2 auth = yes
  client plaintext auth = no
  client min protocol = SMB2_02

Or use the '-k' command line option only without the -U option, which will make use of an existing krb5 ccache.