{"api_version":"1","generated_at":"2026-04-23T04:33:00+00:00","cve":"CVE-2020-14342","urls":{"html":"https://cve.report/CVE-2020-14342","api":"https://cve.report/api/cve/CVE-2020-14342.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-14342","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-14342"},"summary":{"title":"CVE-2020-14342","description":"It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-09-09 12:15:00","updated_at":"2023-11-07 03:17:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/","name":"FEDORA-2020-cfdd73f1b4","refsource":"","tags":[],"title":"[SECURITY] Fedora 32 Update: cifs-utils-6.11-1.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"1860884 – (CVE-2020-14342) CVE-2020-14342 cifs-utils: shell command injection in mount.cifs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.samba.org/archive/samba-technical/2020-September/135747.html","name":"https://lists.samba.org/archive/samba-technical/2020-September/135747.html","refsource":"MISC","tags":["Exploit","Mailing List","Vendor Advisory"],"title":"cifs-utils release 6.11 ready for download","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html","name":"openSUSE-SU-2020:1579","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1579-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/","name":"FEDORA-2020-ea0b9caac3","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: cifs-utils-6.11-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/","name":"FEDORA-2020-ea0b9caac3","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: cifs-utils-6.11-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/","name":"FEDORA-2020-cfdd73f1b4","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 32 Update: cifs-utils-6.11-1.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202009-16","name":"GLSA-202009-16","refsource":"GENTOO","tags":[],"title":"LinuxCIFS: Shell injection (GLSA 202009-16) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-14342","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14342","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"14342","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"14342","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"14342","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"14342","vulnerable":"1","versionEndIncluding":"6.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"cifs-utils","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-14342","qid":"174970","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2021:1455-1)"},{"cve":"CVE-2020-14342","qid":"198816","title":"Ubuntu Security Notification for cifs-utils Vulnerabilities (USN-5459-1)"},{"cve":"CVE-2020-14342","qid":"501391","title":"Alpine Linux Security Update for cifs-utils"},{"cve":"CVE-2020-14342","qid":"670868","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2021-1284)"},{"cve":"CVE-2020-14342","qid":"750237","title":"OpenSUSE Security Update for cifs-utils (openSUSE-SU-2021:0639-1)"},{"cve":"CVE-2020-14342","qid":"750613","title":"OpenSUSE Security Update for cifs-utils (openSUSE-SU-2020:1579-1)"},{"cve":"CVE-2020-14342","qid":"900174","title":"CBL-Mariner Linux Security Update for cifs-utils 6.8"},{"cve":"CVE-2020-14342","qid":"901503","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (6353-1)"},{"cve":"CVE-2020-14342","qid":"903068","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (2203)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-14342","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"samba","product":{"product_data":[{"product_name":"cifs-utils","version":{"version_data":[{"version_value":"6.11"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-77"}]}]},"references":{"reference_data":[{"url":"https://lists.samba.org/archive/samba-technical/2020-September/135747.html","refsource":"MISC","name":"https://lists.samba.org/archive/samba-technical/2020-September/135747.html"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","refsource":"CONFIRM"},{"refsource":"GENTOO","name":"GLSA-202009-16","url":"https://security.gentoo.org/glsa/202009-16"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1579","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html"},{"refsource":"FEDORA","name":"FEDORA-2020-ea0b9caac3","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/"},{"refsource":"FEDORA","name":"FEDORA-2020-cfdd73f1b4","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/"}]},"description":{"description_data":[{"lang":"eng","value":"It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges."}]},"impact":{"cvss":[[{"vectorString":"4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.0"}]]}},"nvd":{"publishedDate":"2020-09-09 12:15:00","lastModifiedDate":"2023-11-07 03:17:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH"},"exploitabilityScore":1,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndIncluding":"6.10","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"14342","Ordinal":"175572","Title":"CVE-2020-14342","CVE":"CVE-2020-14342","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"14342","Ordinal":"1","NoteData":"It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"14342","Ordinal":"2","NoteData":"2020-09-09","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"14342","Ordinal":"3","NoteData":"2020-11-10","Type":"Other","Title":"Modified"}]}}}