Lucene search

K
f5F5F5:K16505
HistoryNov 07, 2015 - 12:00 a.m.

K16505 : NTP vulnerability CVE-2015-1798

2015-11-0700:00:00
my.f5.com
17

6 Medium

AI Score

Confidence

High

1.8 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:H/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

79.8%

Security Advisory Description

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
(
CVE-2015-1798
)
Impact
For BIG-IP systems using a default network time protocol (NTP) configuration, there is no impact. However, BIG-IP systems with an NTP configuration that is customized in line with the requirements of the advisory may be vulnerable.

6 Medium

AI Score

Confidence

High

1.8 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:H/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

79.8%