{"id":"CVE-2023-4154","summary":"Samba: ad dc password exposure to privileged users and rodcs","details":"A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.","modified":"2026-05-15T04:07:14.027258384Z","published":"2023-11-07T19:14:28.305Z","related":["SUSE-SU-2023:4046-1","SUSE-SU-2023:4059-1","SUSE-SU-2023:4096-1","USN-6425-3","openSUSE-SU-2024:13332-1"],"database_specific":{"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4154.json","cwe_ids":["CWE-787"]},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://packages.fedoraproject.org/"},{"type":"WEB","url":"https://www.samba.org/samba/security/CVE-2023-4154.html"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-4154"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4154.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4154"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231124-0002/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241883"},{"type":"REPORT","url":"https://bugzilla.samba.org/show_bug.cgi?id=15424"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}