CVE-2021-45100

Related Vulnerabilities: CVE-2021-45100  

The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.

Description

The MITRE CVE dictionary describes this issue as:

The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.

Additional Information

  • Bugzilla 2035345: CVE-2021-45100 kernel: ksmbd server communicates in cleartext even though encryption has been enabled due to a violation of the SMB protocol specification
  • CWE-319: Cleartext Transmission of Sensitive Information
  • FAQ: Frequently asked questions about CVE-2021-45100