Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Silent downgrade |
|
Description |
+ |
A security issue has been found in Samba versions 3.0.0 to 4.15.1. A man in the middle attack can force the client side SMB1 code to fall-back to plaintext or NTLM based authentication even if Kerberos authentication was requested by the user or application. |
|
References |
+ |
https://www.samba.org/samba/security/CVE-2016-2124.html |
+ |
https://www.samba.org/samba/ftp/patches/security/samba-4.15.1-security-2021-11-09.patch |
|
Notes |
+ |
Workaround |
+ |
========== |
+ |
|
+ |
To mitigate the issue, ensure the following [global] smb.conf parameters are set to their default values as shown below: |
+ |
|
+ |
client lanman auth = no |
+ |
client NTLMv2 auth = yes |
+ |
client plaintext auth = no |
+ |
client min protocol = SMB2_02 |
+ |
|
+ |
Or use the '-k' command line option only without the -U option, which will make use of an existing krb5 ccache. |
|