CVE-2023-3347

MEDIUM

Samba 4.17.0-4.17.9 - Improper Enforcement of Message Integrity in SMB2 Packet Signing

Title source: llm
STIX 2.1

Description

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

References (9)

Core 9
Core References
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:4325
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:4328
Third Party Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-3347
Issue Tracking, Third Party Advisory issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2222792

Scores

CVSS v3 5.9
EPSS 0.0045
EPSS Percentile 63.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-924 CWE-347
Status published
Products (5)
fedoraproject/fedora 38
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
redhat/storage 3.0
samba/samba 4.17.0 - 4.17.10
Published Jul 20, 2023
Tracked Since Feb 18, 2026