// For flags

CVE-2016-9463

 

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.1.2, 9.0.6, and 8.2.9 suffer from SMB User Authentication Bypass. Nextcloud/ownCloud include an optional and not by default enabled SMB authentication component that allows authenticating users against an SMB server. This backend is implemented in a way that tries to connect to a SMB server and if that succeeded consider the user logged-in. The backend did not properly take into account SMB servers that have any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials. Note: The SMB backend is disabled by default and requires manual configuration in the Nextcloud/ownCloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability.

Nextcloud Server en versiones anteriores a 9.0.54 y 10.0.1 y ownCloud Server en versiones anteirores a 9.1.2, 9.0.6 y 8.2.9 sufren de Bypass de autenticación de usuario SMB. Nextcloud/ownCloud Incluye un componente de autenticación SMB opcional y no predeterminado que permite autenticar a los usuarios en un servidor SMB. Este backend se implementa de una manera que intenta conectarse a un servidor SMB y si eso sucede considerar al usuario conectado. El backend no tomó correctamente en cuenta los servidores SMB que tienen cualquier tipo de configuración anónima. Este es el valor predeterminado en los servidores SMB en la actualidad y permite a un atacante no autenticado acceder a una cuenta sin credenciales válidas. Nota: El servidor SMB está deshabilitado de forma predeterminada y requiere una configuración manual en el archivo de configuración Nextcloud/ownCloud. Si no has configurado el servidor SMB, no te verás afectado por esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-11-19 CVE Reserved
  • 2017-03-28 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2024-09-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
  • CWE-303: Incorrect Implementation of Authentication Algorithm
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nextcloud
Search vendor "Nextcloud"
Nextcloud Server
Search vendor "Nextcloud" for product "Nextcloud Server"
< 9.0.54
Search vendor "Nextcloud" for product "Nextcloud Server" and version " < 9.0.54"
-
Affected
Nextcloud
Search vendor "Nextcloud"
Nextcloud Server
Search vendor "Nextcloud" for product "Nextcloud Server"
>= 10.0.0 < 10.0.1
Search vendor "Nextcloud" for product "Nextcloud Server" and version " >= 10.0.0 < 10.0.1"
-
Affected
Owncloud
Search vendor "Owncloud"
Owncloud
Search vendor "Owncloud" for product "Owncloud"
>= 8.2.0 < 8.2.9
Search vendor "Owncloud" for product "Owncloud" and version " >= 8.2.0 < 8.2.9"
-
Affected
Owncloud
Search vendor "Owncloud"
Owncloud
Search vendor "Owncloud" for product "Owncloud"
>= 9.0.0 < 9.0.4
Search vendor "Owncloud" for product "Owncloud" and version " >= 9.0.0 < 9.0.4"
-
Affected
Owncloud
Search vendor "Owncloud"
Owncloud
Search vendor "Owncloud" for product "Owncloud"
>= 9.1.0 < 9.1.2
Search vendor "Owncloud" for product "Owncloud" and version " >= 9.1.0 < 9.1.2"
-
Affected