CVE-2015-7974 — Improper Authentication in NTP
CWE-287 — Improper AuthenticationCWE-304 — Missing Critical Step in AuthenticationCWE-119 — Improper Restriction of Operations within the Bounds of a Memory BufferCWE-20 — Improper Input ValidationCWE-200 — Sensitive Information ExposureCWE-399CWE-400 — Uncontrolled Resource Consumption24 documents11 sources
Severity
7.7HIGHNVD
OSV6.5
EPSS
7.8%
top 8.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26
Latest updateMay 13
Description
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:NExploitability: 3.1 | Impact: 4.0
Affected Packages5 packages
Also affects: Debian Linux 8.0, 9.0
🔴Vulnerability Details
3📋Vendor Advisories
18Cisco▶
Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: January 2016↗2016-01-28
💬Community
2Bugzilla▶
CVE-2015-7974 CVE-2015-8138 CVE-2015-7973 CVE-2015-7975 CVE-2015-7976 CVE-2015-7977 CVE-2015-7978 CVE-2015-7979 CVE-2015-8158 CVE-2015-8139 CVE-2015-8140 ntp: various flaws [fedora-all]↗2016-01-20
Bugzilla▶
CVE-2015-7974 ntp: missing key check allows impersonation between authenticated peers (VU#357792)↗2016-01-11