CVE-2021-45100 Information
Share on:
Jun 06, 2022
cve
Description
The ksmbd server through 3.4.2 as used in the Linux kernel through 5.15.8 sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation it disables encryption.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Reference
https://github.com/cifsd-team/ksmbd/pull/551 https://github.com/cifsd-team/ksmbd/issues/550 https://marc.info/?l=linux-kernel&m=163961726017023&w=2 https://security.netapp.com/advisory/ntap-20220107-0001/
Attack Complexity
LOW
Privileges Required
NONE
User Interaction Required
NONE
Scope
NONE
Confidentiality Impact
UNCHANGED
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
NONE
Base Severity
7.5