First published: Tue Jan 26 2016(Updated: )
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ntp | 1:4.2.8p12+dfsg-4 1:4.2.8p15+dfsg-1 | |
Siemens TIM 4R-IE | ||
Siemens TIM 4R-IE DNP3 | ||
NTP | >=4.2.0<4.2.8 | |
NTP | >=4.3.0<4.3.90 | |
NTP | =4.2.8 | |
NTP | =4.2.8-p1 | |
NTP | =4.2.8-p1-beta1 | |
NTP | =4.2.8-p1-beta2 | |
NTP | =4.2.8-p1-beta3 | |
NTP | =4.2.8-p1-beta4 | |
NTP | =4.2.8-p1-beta5 | |
NTP | =4.2.8-p1-rc1 | |
NTP | =4.2.8-p1-rc2 | |
NTP | =4.2.8-p2 | |
NTP | =4.2.8-p2-rc1 | |
NTP | =4.2.8-p2-rc2 | |
NTP | =4.2.8-p2-rc3 | |
NTP | =4.2.8-p3 | |
NTP | =4.2.8-p3-rc1 | |
NTP | =4.2.8-p3-rc2 | |
NTP | =4.2.8-p3-rc3 | |
NTP | =4.2.8-p4 | |
NTP | =4.2.8-p5 | |
Siemens TIM 4R-IE DNP3 | ||
siemens SIMATIC TIM 4R-IE | ||
Siemens TIM 4R-IE | ||
Siemens TIM 4R-IE | ||
IBM Data ONTAP | ||
NetApp OnCommand Balance | ||
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7974 is classified as a medium severity vulnerability due to the risk of impersonation attacks.
To fix CVE-2015-7974, upgrade your NTP software to version 4.2.8p12 or later, or 4.3.90 or later.
CVE-2015-7974 affects NTP versions before 4.2.8p6 and 4.3.x before 4.3.90.
Yes, CVE-2015-7974 can allow remote attackers to conduct impersonation attacks using an arbitrary trusted key.
There is no specific workaround for CVE-2015-7974; patching the software is the recommended solution.