First published: Thu Apr 28 2016(Updated: )
An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ntp | 1:4.2.8p12+dfsg-4 1:4.2.8p15+dfsg-1 | |
NTP ntp | =4.2.8-p4 | |
redhat/ntp | <4.2.8 | 4.2.8 |
Siemens TIM 4R-IE | ||
Siemens TIM 4R-IE DNP3 | ||
Siemens Simatic Net CP 443-1 OPC UA Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1550 has been classified as a high-severity vulnerability due to its potential for message authentication exploitation.
To fix CVE-2016-1550, update to the patched versions of the ntp package: 1:4.2.8p12+dfsg-4 or 1:4.2.8p15+dfsg-1 for Debian and 4.2.8 for Red Hat.
CVE-2016-1550 affects multiple products including NTP 4.2.8p4, Siemens TIM 4R-IE, and SIMATIC NET CP 443-1 OPC UA.
Yes, an attacker can exploit CVE-2016-1550 remotely by sending crafted messages to the vulnerable NTP implementations.
Exploiting CVE-2016-1550 may allow an attacker to recover the message digest key, compromising the integrity of the NTP service.