{"api_version":"1","generated_at":"2026-04-23T00:41:07+00:00","cve":"CVE-2021-43566","urls":{"html":"https://cve.report/CVE-2021-43566","api":"https://cve.report/api/cve/CVE-2021-43566.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43566","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43566"},"summary":{"title":"CVE-2021-43566","description":"All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-01-11 16:15:00","updated_at":"2022-10-14 11:42:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"https://bugzilla.samba.org/show_bug.cgi?id=13979","name":"https://bugzilla.samba.org/show_bug.cgi?id=13979","refsource":"MISC","tags":[],"title":"13979 – (CVE-2021-43566) CVE-2021-43566 [SECURITY] mkdir race condition allows share escape in Samba 4.x","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20220110-0001/","name":"https://security.netapp.com/advisory/ntap-20220110-0001/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-43566 Samba Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.samba.org/samba/security/CVE-2021-43566.html","name":"https://www.samba.org/samba/security/CVE-2021-43566.html","refsource":"MISC","tags":[],"title":"Samba - Security Announcement Archive","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"https://www.samba.org/samba/history/","name":"https://www.samba.org/samba/history/","refsource":"MISC","tags":[],"title":"Samba Release History","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43566","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43566","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"samba","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-43566","qid":"180832","title":"Debian Security Update for samba (CVE-2021-43566)"},{"cve":"CVE-2021-43566","qid":"198651","title":"Ubuntu Security Notification for Samba Vulnerabilities (USN-5260-1)"},{"cve":"CVE-2021-43566","qid":"296057","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 44.113.4 Missing (bulletinapr2022)"},{"cve":"CVE-2021-43566","qid":"355336","title":"Amazon Linux Security Advisory for samba : ALAS2023-2023-032"},{"cve":"CVE-2021-43566","qid":"501490","title":"Alpine Linux Security Update for samba"},{"cve":"CVE-2021-43566","qid":"671442","title":"EulerOS Security Update for samba (EulerOS-SA-2022-1459)"},{"cve":"CVE-2021-43566","qid":"671468","title":"EulerOS Security Update for samba (EulerOS-SA-2022-1438)"},{"cve":"CVE-2021-43566","qid":"671569","title":"EulerOS Security Update for samba (EulerOS-SA-2022-1586)"},{"cve":"CVE-2021-43566","qid":"671623","title":"EulerOS Security Update for samba (EulerOS-SA-2022-1666)"},{"cve":"CVE-2021-43566","qid":"671635","title":"EulerOS Security Update for samba (EulerOS-SA-2022-1652)"},{"cve":"CVE-2021-43566","qid":"690784","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for samba (8579074c-839f-11ec-a3b2-005056a311d1)"},{"cve":"CVE-2021-43566","qid":"751680","title":"OpenSUSE Security Update for samba (openSUSE-SU-2022:0283-1)"},{"cve":"CVE-2021-43566","qid":"751683","title":"SUSE Enterprise Linux Security Update for samba (SUSE-SU-2022:0323-1)"},{"cve":"CVE-2021-43566","qid":"751994","title":"SUSE Enterprise Linux Security Update for samba (SUSE-SU-2022:0283-1)"},{"cve":"CVE-2021-43566","qid":"901488","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for samba (7489)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-43566","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://bugzilla.samba.org/show_bug.cgi?id=13979","refsource":"MISC","name":"https://bugzilla.samba.org/show_bug.cgi?id=13979"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220110-0001/","url":"https://security.netapp.com/advisory/ntap-20220110-0001/"},{"refsource":"MISC","name":"https://www.samba.org/samba/security/CVE-2021-43566.html","url":"https://www.samba.org/samba/security/CVE-2021-43566.html"}]}},"nvd":{"publishedDate":"2022-01-11 16:15:00","lastModifiedDate":"2022-10-14 11:42:00","problem_types":["CWE-362"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW"},"exploitabilityScore":1,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":1.2},"severity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","versionEndExcluding":"4.13.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43566","Ordinal":"220636","Title":"CVE-2021-43566","CVE":"CVE-2021-43566","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43566","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}