Lucene search

K
ciscoCiscoCISCO-SA-20140709-CVE-2014-3309
HistoryJul 09, 2014 - 2:04 p.m.

Cisco IOS Software and IOS XE Software NTP Access Group Vulnerability

2014-07-0914:04:56
tools.cisco.com
19

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

61.9%

A vulnerability in the implementation of the ntp access-group command in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the configured Network Time Protocol (NTP) access group and query the affected NTP-configured server for the time.

The vulnerability is due to improper implementation of the ntp access-group command in certain Cisco IOS Software and Cisco IOS XE Software versions. An attacker could exploit this vulnerability by sending NTP query packets to an affected NTP server configured to deny all requests. An exploit could allow the attacker to bypass the configured NTP access group and query the affected NTP-configured server for the time.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, the targeted NTP server must be configured to deny all requests. In addition, the attacker must send NTP query packets to the targeted system. Depending on where the targeted system is in the environment, an attacker may need access to trusted, internal networks behind a firewall to send NTP query packets to the system. This requirement may decrease the likelihood of a successful exploit.

Affected configurations

Vulners
Node
ciscoiosMatchany
OR
ciscocisco_iosMatch3.7sxe
OR
ciscocisco_iosMatch3.8sxe
OR
ciscocisco_iosMatch3.9sxe
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.11sxe
OR
ciscoiosMatchany
OR
ciscocisco_iosMatch3.7.0sxe
OR
ciscocisco_iosMatch3.7.1sxe
OR
ciscocisco_iosMatch3.7.2sxe
OR
ciscocisco_iosMatch3.7.3sxe
OR
ciscocisco_iosMatch3.7.4sxe
OR
ciscocisco_iosMatch3.8.0sxe
OR
ciscocisco_iosMatch3.8.1sxe
OR
ciscocisco_iosMatch3.8.2sxe
OR
ciscocisco_iosMatch3.9.1sxe
OR
ciscocisco_iosMatch3.9.0sxe
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.2sxe
OR
ciscocisco_iosMatch3.10.0asxe
OR
ciscocisco_iosMatch3.11.1sxe
OR
ciscocisco_iosMatch3.11.2sxe
VendorProductVersionCPE
ciscoiosanycpe:2.3:o:cisco:ios:any:*:*:*:*:*:*:*
ciscocisco_ios3.7scpe:2.3:o:cisco:cisco_ios:3.7s:xe:*:*:*:*:*:*
ciscocisco_ios3.8scpe:2.3:o:cisco:cisco_ios:3.8s:xe:*:*:*:*:*:*
ciscocisco_ios3.9scpe:2.3:o:cisco:cisco_ios:3.9s:xe:*:*:*:*:*:*
ciscocisco_ios3.10scpe:2.3:o:cisco:cisco_ios:3.10s:xe:*:*:*:*:*:*
ciscocisco_ios3.11scpe:2.3:o:cisco:cisco_ios:3.11s:xe:*:*:*:*:*:*
ciscocisco_ios3.7.0scpe:2.3:o:cisco:cisco_ios:3.7.0s:xe:*:*:*:*:*:*
ciscocisco_ios3.7.1scpe:2.3:o:cisco:cisco_ios:3.7.1s:xe:*:*:*:*:*:*
ciscocisco_ios3.7.2scpe:2.3:o:cisco:cisco_ios:3.7.2s:xe:*:*:*:*:*:*
ciscocisco_ios3.7.3scpe:2.3:o:cisco:cisco_ios:3.7.3s:xe:*:*:*:*:*:*
Rows per page:
1-10 of 221

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

61.9%

Related for CISCO-SA-20140709-CVE-2014-3309