First published: Sun Jul 03 2016(Updated: )
The NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote authenticated users to obtain root privileges for writing to unspecified scripts, and consequently obtain sensitive information or modify data, by leveraging access to the nobody account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | <=6.0 | |
Meinberg LANTIME M1000 | ||
Meinberg Lantime M3000 | ||
Meinberg Ims-lantime M500 | ||
Meinberg Lantime M100 | ||
Meinbergglobal Lantime M200 | ||
Meinberg Global Lantime M300 | ||
Meinberg Lantime M400 | ||
Meinberg Lantime M600 | ||
Meinberg Lantime M900 | ||
Meinberg LCES | ||
Meinberg Syncfire 1100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3989 has a medium severity rating due to the potential for remote authenticated users to gain root privileges on affected devices.
To fix CVE-2016-3989, upgrade the firmware of affected Meinberg devices to version 6.20.004 or later.
CVE-2016-3989 affects multiple Meinberg products including the IMS-LANTIME and LANTIME series devices with firmware versions before 6.20.004.
The impact of CVE-2016-3989 includes unauthorized access to root privileges, possibly compromising system integrity and security.
CVE-2016-3989 is related to improper access controls in the NTP time-server interface allowing privilege escalation.