6.7 Medium
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.966 High
EPSS
Percentile
99.6%
This advisory supplement is to accompany the NCCIC/ICS-CERT advisory titled ICSA-14-353-01C Network Time Protocol Vulnerabilities that was published February 5, 2015, on the ICS‑CERT web site.
Please refer to this advisory for all the details of the vulnerabilities. The purpose of this advisory supplement is to document which products are affected by these vulnerabilities and suggest how users of these products may mitigate the effects of these vulnerabilities. This document will be updated as needed.
ICS-CERT thanks the following companies for responding to our inquiry on the affected products (listed vendors may have answered yes or no):
Arbiter, Catapult Software, Codesys, Ecava IntegraXor, Festo, Innominate, KEP (Kessler-Ellis Products), Meinberg, Microsys, spol. s r.o., Nordex Energy GmbH, Pepperl+Fuchs GmbH, Progea, Red Lion, Roche Diagnostics GmbH, SELINC, Sielcosistemi, Siemens, Sierra Wireless, SUBNET, Trihedral Engineering Limited, and Wind River Systems.
ICS-CERT encourages any asset owners/operators, developers, or vendors to coordinate known implementations of the affected products directly with ICS-CERT.
Arbiter Systems products:
Innomoninate products:
Innominate Security Technologies AG, Security Advisory 2015/01/20-001 addresses
CVE-2014-9295.
Meinberg products:
Please see Meinberg’s public notification and mitigation strategies at:
Siemens products:
Wind River System products:
There are patches for WR Linux for the other (related) CVEs (2014-9293 - 9286) available at https://knowledge.windriver.com/?title=Content_Lookup&id=044772:
www.siemens.com/cert/advisories
www.siemens.com/cert/advisories
www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-671683.pdf
www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa749212.pdf
www.windriver.com/feeds/vxworks_networking_security_notice.xml
www.windriver.com/feeds/wrsn.xml
knowledge.windriver.com/?title=Content_Lookup&id=044772
knowledge.windriver.com/Content_Lookup?id=044944
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Network%20Time%20Protocol%20Vulnerabilities%20%28Supplement%20Update%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-14-353-01-supplementa
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-14-353-01-supplementa&title=Network%20Time%20Protocol%20Vulnerabilities%20%28Supplement%20Update%20A%29
www.innominate.com/data/downloads/software/innominate_security_advisory_20150120_001_en.pdf
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-14-353-01-supplementa
www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1405-multiple-ntp-vulnerabilities.htm
www.meinbergglobal.com/english/sw/ntp.htm
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-14-353-01-supplementa
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Network%20Time%20Protocol%20Vulnerabilities%20%28Supplement%20Update%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-14-353-01-supplementa