7.5
CVSSv3

CVE-2021-45100

Published: 16/12/2021 Updated: 29/03/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ksmbd server up to and including 3.4.2, as used in the Linux kernel up to and including 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ksmbd_project ksmbd

netapp h410c_firmware -

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

Vendor Advisories

The ksmbd server through 342, as used in the Linux kernel through 5158, sometimes communicates in cleartext even though encryption has been enabled This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 311 protocol, which is a violation of the SMB protocol specification When Windows 10 detects this protocol viol ...