{"api_version":"1","generated_at":"2026-05-10T01:20:45+00:00","cve":"CVE-2018-16857","urls":{"html":"https://cve.report/CVE-2018-16857","api":"https://cve.report/api/cve/CVE-2018-16857.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16857","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16857"},"summary":{"title":"CVE-2018-16857","description":"Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2018-11-28 14:29:00","updated_at":"2019-10-09 23:36:00"},"problem_types":["CWE-358"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/106024","name":"106024","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Samba Security Bypass and Denial of Service Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.samba.org/samba/security/CVE-2018-16857.html","name":"https://www.samba.org/samba/security/CVE-2018-16857.html","refsource":"CONFIRM","tags":["Mitigation","Patch","Vendor Advisory"],"title":"Samba - Security Announcement Archive","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857","refsource":"CONFIRM","tags":["Issue Tracking","Mitigation","Third Party Advisory"],"title":"1649278 – (CVE-2018-16857) CVE-2018-16857 samba: Bad password count in AD DC not always effective","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20181127-0001/","name":"https://security.netapp.com/advisory/ntap-20181127-0001/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"November 2018 Samba Vulnerabilities in NetApp StorageGRID Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202003-52","name":"GLSA-202003-52","refsource":"GENTOO","tags":[],"title":"Samba: Multiple vulnerabilities (GLSA 202003-52) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16857","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16857","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16857","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"samba","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16857","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"samba","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2018-16857","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"samba","version":{"version_data":[{"version_value":"4.9.3"}]}}]},"vendor_name":"[UNKNOWN]"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade."}]},"impact":{"cvss":[[{"vectorString":"7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.0"}]]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-358"}]}]},"references":{"reference_data":[{"name":"https://security.netapp.com/advisory/ntap-20181127-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20181127-0001/"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857"},{"name":"106024","refsource":"BID","url":"http://www.securityfocus.com/bid/106024"},{"name":"https://www.samba.org/samba/security/CVE-2018-16857.html","refsource":"CONFIRM","url":"https://www.samba.org/samba/security/CVE-2018-16857.html"},{"refsource":"GENTOO","name":"GLSA-202003-52","url":"https://security.gentoo.org/glsa/202003-52"}]}},"nvd":{"publishedDate":"2018-11-28 14:29:00","lastModifiedDate":"2019-10-09 23:36:00","problem_types":["CWE-358"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.0","versionEndExcluding":"4.9.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16857","Ordinal":"133668","Title":"CVE-2018-16857","CVE":"CVE-2018-16857","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16857","Ordinal":"1","NoteData":"Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16857","Ordinal":"2","NoteData":"2018-11-28","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16857","Ordinal":"3","NoteData":"2020-03-25","Type":"Other","Title":"Modified"}]}}}