CVE-2020-25719
📋 TL;DR
This vulnerability in Samba's Active Directory Domain Controller allows attackers to bypass Kerberos authentication by exploiting confusion about user identity when Kerberos PAC (Privilege Attribute Certificate) validation isn't strictly enforced. Attackers could impersonate any domain user, potentially leading to domain compromise. This affects organizations running Samba as an AD DC.
💻 Affected Systems
- Samba
📦 What is this software?
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems Eus by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems Eus →
Enterprise Linux For Ibm Z Systems Eus by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems Eus →
Enterprise Linux For Power Big Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Big Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian Eus →
Enterprise Linux For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian Eus →
Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Enterprise Linux Server Update Services For Sap Solutions by Redhat
View all CVEs affecting Enterprise Linux Server Update Services For Sap Solutions →
Enterprise Linux Server Update Services For Sap Solutions by Redhat
View all CVEs affecting Enterprise Linux Server Update Services For Sap Solutions →
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Samba by Samba
Samba by Samba
Samba by Samba
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Total domain compromise where attackers gain administrative privileges over the entire Active Directory domain, allowing them to create/delete users, modify permissions, and access all domain resources.
Likely Case
Privilege escalation where attackers gain unauthorized access to sensitive resources by impersonating legitimate domain users with higher privileges.
If Mitigated
Limited impact with proper network segmentation and monitoring, where unauthorized access attempts are detected and contained before significant damage occurs.
🎯 Exploit Status
Exploitation requires existing network access and ability to interact with Kerberos authentication. Proof-of-concept code has been published in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Samba 4.13.17, 4.14.12, 4.15.5 or later
Vendor Advisory: https://www.samba.org/samba/security/CVE-2020-25719.html
Restart Required: Yes
Instructions:
1. Backup current Samba configuration. 2. Update Samba to patched version using your distribution's package manager. 3. Restart Samba services: 'systemctl restart samba' or equivalent. 4. Verify the update with 'smbd -V'.
🔧 Temporary Workarounds
Enforce PAC Validation
linuxConfigure Samba to strictly require Kerberos PAC validation for all authentication requests
Add 'require PAC = yes' to [global] section of smb.conf
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Samba AD DCs from untrusted networks
- Enable detailed Kerberos authentication logging and monitor for suspicious authentication patterns
🔍 How to Verify
Check if Vulnerable:
Run 'smbd -V' and check if version is below 4.13.17, 4.14.12, or 4.15.5. Also verify Samba is configured as AD DC with 'samba-tool domain info'.
Check Version:
smbd -V
Verify Fix Applied:
After patching, verify version with 'smbd -V' shows patched version. Test authentication with various users to ensure proper PAC validation.
📡 Detection & Monitoring
Log Indicators:
- Unusual Kerberos authentication patterns
- Authentication attempts without proper PAC validation
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unusual Kerberos ticket requests from unexpected sources
- Authentication traffic patterns inconsistent with normal user behavior
SIEM Query:
source="samba" AND (event="authentication" OR event="kerberos") AND (status="success" AND pac_validation="missing")
🔗 References
- https://bugzilla.redhat.com/show_bug.cgi?id=2019732
- https://security.gentoo.org/glsa/202309-06
- https://www.samba.org/samba/security/CVE-2020-25719.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2019732
- https://security.gentoo.org/glsa/202309-06
- https://www.samba.org/samba/security/CVE-2020-25719.html