Search for vulnerabilities
Vulnerability details: VCID-rnct-e6p8-7uef
Vulnerability ID VCID-rnct-e6p8-7uef
Aliases CVE-2018-10919
Summary The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
epss 0.02605 https://api.first.org/data/v1/epss?cve=CVE-2018-10919
cvssv2 4.0 https://nvd.nist.gov/vuln/detail/CVE-2018-10919
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2018-10919
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json
https://api.first.org/data/v1/epss?cve=CVE-2018-10919
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919
https://security.netapp.com/advisory/ntap-20180814-0001/
https://www.debian.org/security/2018/dsa-4271
https://www.samba.org/samba/security/CVE-2018-10919.html
http://www.securityfocus.com/bid/105081
1610645 https://bugzilla.redhat.com/show_bug.cgi?id=1610645
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-10919 https://nvd.nist.gov/vuln/detail/CVE-2018-10919
USN-3738-1 https://usn.ubuntu.com/3738-1/
No exploits are available.
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-10919
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-10919
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.85046
EPSS Score 0.02605
Published At Aug. 8, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:40:37.869374+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3738-1/ 37.0.0