Language:
Severity: Critical
ID: 223270
File Name: unpatched_CVE_2020_1472.nasl
Version: 1.3
Type: local
Agent: unix
Family: Misc.
Published: 3/4/2025
Updated: 9/2/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Critical
Score: 10.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-1472
Risk Factor: Critical
Base Score: 10
Temporal Score: 9.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:samba-winbind-clients, p-cpe:/a:redhat:enterprise_linux:samba-client, p-cpe:/a:redhat:enterprise_linux:samba-winbind-krb5-locator, p-cpe:/a:redhat:enterprise_linux:libsmbclient-devel, p-cpe:/a:redhat:enterprise_linux:samba4-devel, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:samba-winbind-devel, p-cpe:/a:redhat:enterprise_linux:samba4-test, p-cpe:/a:redhat:enterprise_linux:samba4-winbind, p-cpe:/a:redhat:enterprise_linux:samba-glusterfs, p-cpe:/a:redhat:enterprise_linux:samba4-pidl, p-cpe:/a:redhat:enterprise_linux:samba, p-cpe:/a:redhat:enterprise_linux:samba-doc, p-cpe:/a:redhat:enterprise_linux:samba-common, p-cpe:/a:redhat:enterprise_linux:samba4-swat, p-cpe:/a:redhat:enterprise_linux:samba4-winbind-clients, p-cpe:/a:redhat:enterprise_linux:samba4, p-cpe:/a:redhat:enterprise_linux:samba-domainjoin-gui, p-cpe:/a:redhat:enterprise_linux:samba4-client, p-cpe:/a:redhat:enterprise_linux:libsmbclient, p-cpe:/a:redhat:enterprise_linux:samba-swat, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:samba4-libs, p-cpe:/a:redhat:enterprise_linux:samba4-dc-libs, p-cpe:/a:redhat:enterprise_linux:samba4-dc, p-cpe:/a:redhat:enterprise_linux:samba4-python, p-cpe:/a:redhat:enterprise_linux:samba4-winbind-krb5-locator, p-cpe:/a:redhat:enterprise_linux:samba4-common, p-cpe:/a:redhat:enterprise_linux:samba-winbind
Required KB Items: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 8/11/2020
CISA Known Exploited Vulnerability Due Dates: 9/21/2020
CVE: CVE-2020-1472