First published: Wed Apr 20 2016(Updated: )
The NTP implementation in Cisco IOS 15.1 and 15.5 and IOS XE 3.2 through 3.17 allows remote attackers to modify the system time via crafted packets, aka Bug ID CSCux46898.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1\(1\)s | |
Cisco IOS | =15.1\(1\)s1 | |
Cisco IOS | =15.1\(1\)s2 | |
Cisco IOS | =15.1\(2\)s | |
Cisco IOS | =15.1\(2\)s1 | |
Cisco IOS | =15.1\(2\)s2 | |
Cisco IOS | =15.1\(3\)s | |
Cisco IOS | =15.1\(3\)s0a | |
Cisco IOS | =15.1\(3\)s1 | |
Cisco IOS | =15.1\(3\)s2 | |
Cisco IOS | =15.1\(3\)s3 | |
Cisco IOS | =15.1\(3\)s4 | |
Cisco IOS | =15.1\(3\)s5 | |
Cisco IOS | =15.1\(3\)s5a | |
Cisco IOS | =15.1\(3\)s6 | |
Cisco IOS | =15.5\(1\)s | |
Cisco IOS | =15.5\(1\)s1 | |
Cisco IOS | =15.5\(1\)s2 | |
Cisco IOS | =15.5\(1\)s3 | |
Cisco IOS | =15.5\(1\)s4 | |
Cisco IOS | =15.5\(2\)s | |
Cisco IOS | =15.5\(2\)s1 | |
Cisco IOS | =15.5\(2\)s2 | |
Cisco IOS | =15.5\(2\)s3 | |
Cisco IOS | =15.5\(2\)t | |
Cisco IOS | =15.5\(3\)m | |
Cisco IOS | =15.5\(3\)m0a | |
Cisco IOS | =15.5\(3\)m1 | |
Cisco IOS | =15.5\(3\)s | |
Cisco IOS | =15.5\(3\)s0a | |
Cisco IOS | =15.5\(3\)s1 | |
Cisco IOS | =15.5\(3\)s1a | |
Cisco IOS | =15.5\(3\)sn | |
Cisco IOS XE | =3.2.0ja | |
Cisco IOS XE | =3.2.0s | |
Cisco IOS XE | =3.2.0se | |
Cisco IOS XE | =3.2.0sg | |
Cisco IOS XE | =3.2.0xo | |
Cisco IOS XE | =3.2.1s | |
Cisco IOS XE | =3.2.1se | |
Cisco IOS XE | =3.2.1sg | |
Cisco IOS XE | =3.2.1xo | |
Cisco IOS XE | =3.2.2s | |
Cisco IOS XE | =3.2.2se | |
Cisco IOS XE | =3.2.2sg | |
Cisco IOS XE | =3.2.3s | |
Cisco IOS XE | =3.2.3se | |
Cisco IOS XE | =3.2.3sg | |
Cisco IOS XE | =3.2.4sg | |
Cisco IOS XE | =3.2.5sg | |
Cisco IOS XE | =3.2.6sg | |
Cisco IOS XE | =3.2.7sg | |
Cisco IOS XE | =3.2.8sg | |
Cisco IOS XE | =3.2.9sg | |
Cisco IOS XE | =3.2.10sg | |
Cisco IOS XE | =3.3.0s | |
Cisco IOS XE | =3.3.0se | |
Cisco IOS XE | =3.3.0sg | |
Cisco IOS XE | =3.3.0sq | |
Cisco IOS XE | =3.3.0xo | |
Cisco IOS XE | =3.3.1s | |
Cisco IOS XE | =3.3.1se | |
Cisco IOS XE | =3.3.1sg | |
Cisco IOS XE | =3.3.1sq | |
Cisco IOS XE | =3.3.1xo | |
Cisco IOS XE | =3.3.2s | |
Cisco IOS XE | =3.3.2se | |
Cisco IOS XE | =3.3.2sg | |
Cisco IOS XE | =3.3.2xo | |
Cisco IOS XE | =3.3.3se | |
Cisco IOS XE | =3.3.4se | |
Cisco IOS XE | =3.3.5se | |
Cisco IOS XE | =3.4.0as | |
Cisco IOS XE | =3.4.0s | |
Cisco IOS XE | =3.4.0sg | |
Cisco IOS XE | =3.4.0sq | |
Cisco IOS XE | =3.4.1s | |
Cisco IOS XE | =3.4.1sg | |
Cisco IOS XE | =3.4.1sq | |
Cisco IOS XE | =3.4.2s | |
Cisco IOS XE | =3.4.2sg | |
Cisco IOS XE | =3.4.3s | |
Cisco IOS XE | =3.4.3sg | |
Cisco IOS XE | =3.4.4s | |
Cisco IOS XE | =3.4.4sg | |
Cisco IOS XE | =3.4.5s | |
Cisco IOS XE | =3.4.5sg | |
Cisco IOS XE | =3.4.6s | |
Cisco IOS XE | =3.4.6sg | |
Cisco IOS XE | =3.4.7sg | |
Cisco IOS XE | =3.5.0e | |
Cisco IOS XE | =3.5.0s | |
Cisco IOS XE | =3.5.0sq | |
Cisco IOS XE | =3.5.1e | |
Cisco IOS XE | =3.5.1s | |
Cisco IOS XE | =3.5.1sq | |
Cisco IOS XE | =3.5.2e | |
Cisco IOS XE | =3.5.2s | |
Cisco IOS XE | =3.5.2sq | |
Cisco IOS XE | =3.5.3e | |
Cisco IOS XE | =3.6.0e | |
Cisco IOS XE | =3.6.0s | |
Cisco IOS XE | =3.6.1e | |
Cisco IOS XE | =3.6.1s | |
Cisco IOS XE | =3.6.2ae | |
Cisco IOS XE | =3.6.2e | |
Cisco IOS XE | =3.6.2s | |
Cisco IOS XE | =3.6.3e | |
Cisco IOS XE | =3.6.4e | |
Cisco IOS XE | =3.7.0bs | |
Cisco IOS XE | =3.7.0e | |
Cisco IOS XE | =3.7.0s | |
Cisco IOS XE | =3.7.0xas | |
Cisco IOS XE | =3.7.1as | |
Cisco IOS XE | =3.7.1e | |
Cisco IOS XE | =3.7.1s | |
Cisco IOS XE | =3.7.2e | |
Cisco IOS XE | =3.7.2s | |
Cisco IOS XE | =3.7.2ts | |
Cisco IOS XE | =3.7.3e | |
Cisco IOS XE | =3.7.3s | |
Cisco IOS XE | =3.7.4as | |
Cisco IOS XE | =3.7.4s | |
Cisco IOS XE | =3.7.5s | |
Cisco IOS XE | =3.7.6s | |
Cisco IOS XE | =3.7.7s | |
Cisco IOS XE | =3.8.0e | |
Cisco IOS XE | =3.8.0ex | |
Cisco IOS XE | =3.8.0s | |
Cisco IOS XE | =3.8.1e | |
Cisco IOS XE | =3.8.1s | |
Cisco IOS XE | =3.8.2s | |
Cisco IOS XE | =3.9.0as | |
Cisco IOS XE | =3.9.0s | |
Cisco IOS XE | =3.9.1as | |
Cisco IOS XE | =3.9.1s | |
Cisco IOS XE | =3.9.2s | |
Cisco IOS XE | =3.10.0as | |
Cisco IOS XE | =3.10.0s | |
Cisco IOS XE | =3.10.1s | |
Cisco IOS XE | =3.10.01s | |
Cisco IOS XE | =3.10.1xbs | |
Cisco IOS XE | =3.10.2s | |
Cisco IOS XE | =3.10.2ts | |
Cisco IOS XE | =3.10.3s | |
Cisco IOS XE | =3.10.4s | |
Cisco IOS XE | =3.10.5s | |
Cisco IOS XE | =3.10.6s | |
Cisco IOS XE | =3.10.7s | |
Cisco IOS XE | =3.11.0s | |
Cisco IOS XE | =3.11.1s | |
Cisco IOS XE | =3.11.2s | |
Cisco IOS XE | =3.11.3s | |
Cisco IOS XE | =3.11.4s | |
Cisco IOS XE | =3.12.0as | |
Cisco IOS XE | =3.12.0s | |
Cisco IOS XE | =3.12.1s | |
Cisco IOS XE | =3.12.2s | |
Cisco IOS XE | =3.12.3s | |
Cisco IOS XE | =3.12.4s | |
Cisco IOS XE | =3.13.0as | |
Cisco IOS XE | =3.13.0s | |
Cisco IOS XE | =3.13.1s | |
Cisco IOS XE | =3.13.2as | |
Cisco IOS XE | =3.13.2s | |
Cisco IOS XE | =3.13.3s | |
Cisco IOS XE | =3.13.4s | |
Cisco IOS XE | =3.13.5s | |
Cisco IOS XE | =3.14.0s | |
Cisco IOS XE | =3.14.1s | |
Cisco IOS XE | =3.14.2s | |
Cisco IOS XE | =3.14.3s | |
Cisco IOS XE | =3.14.4s | |
Cisco IOS XE | =3.15.0s | |
Cisco IOS XE | =3.15.1cs | |
Cisco IOS XE | =3.15.1s | |
Cisco IOS XE | =3.15.2s | |
Cisco IOS XE | =3.15.3s | |
Cisco IOS XE | =3.16.0cs | |
Cisco IOS XE | =3.16.0s | |
Cisco IOS XE | =3.16.1as | |
Cisco IOS XE | =3.16.1s | |
Cisco IOS XE | =3.16.2as | |
Cisco IOS XE | =3.16.2s | |
Cisco IOS XE | =3.16.3s | |
Cisco IOS XE | =3.17.0s | |
Cisco IOS XE | =3.17.1s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1384 is classified as a high severity vulnerability due to its potential impact on system time manipulation.
To remediate CVE-2016-1384, upgrade your Cisco IOS or IOS XE to a version that addresses this vulnerability.
CVE-2016-1384 affects Cisco IOS versions 15.1, 15.5, and IOS XE versions 3.2 through 3.17.
Attackers can exploit CVE-2016-1384 by sending crafted NTP packets to modify the system time of affected devices.
There are no known workarounds for CVE-2016-1384 other than applying the available software updates.