First published: Wed Sep 26 2018(Updated: )
A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA 20180926 PTP is classified as a denial of service (DoS) vulnerability.
To fix Cisco SA 20180926 PTP, you should update your Cisco IOS Software to the latest version that addresses this vulnerability.
An attacker can exploit Cisco SA 20180926 PTP to cause a denial of service condition in the Precision Time Protocol subsystem.
Cisco IOS Software is affected by Cisco SA 20180926 PTP.
No, the vulnerability can be exploited by an unauthenticated, remote attacker.