Lucene search

K
f5F5F5:K13540723
HistoryMar 26, 2018 - 12:00 a.m.

K13540723 : NTP vulnerability CVE-2018-7184

2018-03-2600:00:00
my.f5.com
40

7.3 High

AI Score

Confidence

Low

0.86 High

EPSS

Percentile

98.6%

Security Advisory Description

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the “received” timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704. (CVE-2018-7184)

Impact

When network time protocol (NTP) is configured with an unauthenticated peer, time sources attackers may be able to temporarily disrupt synchronization between the BIG-IP system and the peer NTP device by spoofing packets from the peer.