CVE-2023-3347
MEDIUMSamba 4.17.0-4.17.9 - Improper Enforcement of Message Integrity in SMB2 Packet Signing
Title source: llmDescription
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
References (9)
Core 9
Core References
Vendor Advisory
https://www.samba.org/samba/security/CVE-2023-3347.html
Vendor Advisory
https://security.netapp.com/advisory/ntap-20230731-0010/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5477
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:4325
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:4328
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-3347
Issue Tracking, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2222792
Scores
CVSS v3
5.9
EPSS
0.0045
EPSS Percentile
63.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-924
CWE-347
Status
published
Products (5)
fedoraproject/fedora
38
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
redhat/storage
3.0
samba/samba
4.17.0 - 4.17.10
Published
Jul 20, 2023
Tracked Since
Feb 18, 2026