CVE-2021-43566
Kerberos vulnerability analysis and mitigation

Overview

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS symlink race condition that allows directory creation in areas of the server file system not exported under the share definition. The vulnerability, identified as CVE-2021-43566, was discovered by Michael Hanselmann of Google and affects the Samba file server's directory creation mechanism (Samba Security).

Technical details

The vulnerability exploits a race condition where clients with write access to the exported part of the file system via SMB1 unix extensions or NFS can create symlinks that can race the server by renaming an existing path and then replacing it with a symlink. If the client wins the race, it can cause the server to create a directory under the new symlink target after the exported share path check has been completed. The symlink target can point to anywhere on the server file system. The CVSS v3.1 base score is 2.6 (Low) with vector: AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N (Samba Security).

Impact

If successfully exploited, an authenticated user with permissions to create directories can create directories outside of their intended share location. The authenticated user must have permissions to create a directory under the target directory of the symlink. While the race is difficult to win and has not been seen exploited in the wild, it poses a potential security risk by allowing directory creation outside of intended boundaries (Samba Security).

Mitigation and workarounds

Several mitigation options are available: 1) Do not enable SMB1 (disabled by default in Samba from version 4.11.0 onwards), 2) If SMB1 must be enabled, add 'unix extensions = no' to the [global] section of smb.conf and restart smbd, 3) For non-patched versions, only export areas of the file system by either SMB2 or NFS, not both. The permanent fix is to upgrade to Samba version 4.13.16 or later (Samba Security).

Additional resources


SourceThis report was generated using AI

Related Kerberos vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-37371CRITICAL9.1
  • MySQLMySQL
  • mysql-debugsource
NoYesJun 28, 2024
CVE-2024-37370HIGH7.5
  • KerberosKerberos
  • krb5-plugin-preauth-pkinit
NoYesJun 28, 2024
CVE-2025-24528HIGH7.1
  • KerberosKerberos
  • krb5-pkinit-openssl
NoYesJan 16, 2026
CVE-2025-3576MEDIUM5.9
  • KerberosKerberos
  • krb5-server-ldap-debuginfo
NoYesApr 15, 2025
CVE-2024-26462MEDIUM5.5
  • KerberosKerberos
  • krb5-plugin-preauth-pkinit
NoYesFeb 29, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management