3.7

CVE-2023-32251

A vulnerability has been identified in the Linux kernel's ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of asynchronous requests. This bypass negates the intended anti-brute-force protection, potentially allowing attackers to conduct dictionary attacks more efficiently against user credentials or other authentication mechanisms.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
Package linux
Default Statusunaffected
Version < 5.15.145
Version 0
Status affected
Version < 6.0.*
Version 6.0.0
Status affected
Version < 6.1.29
Version 6.1.0
Status affected
Version < 6.2.16
Version 6.2.0
Status affected
Version < 6.3.2
Version 6.3.0
Status affected
VendorRed Hat
Product Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 6
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.071
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 3.7 2.2 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-307 Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.