5.3
CVSSv3

CVE-2018-7170

Published: 06/03/2018 Updated: 18/06/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.3 | Impact Score: 3.6 | Exploitability Score: 1.6
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

ntpd in ntp 4.2.x prior to 4.2.8p7 and 4.3.x prior to 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp 4.2.8

ntp ntp

synology diskstation manager

synology router manager

synology skynas

synology virtual diskstation manager

synology vs960hd firmware

netapp hci -

netapp solidfire -

hpe hpux-ntp

Vendor Advisories

ntpd in ntp 42x before 428p7 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an incomplete fix for CVE-2016-1549(CVE-2018-7170) The ntpq and ntpdc command-line ...
Ephemeral association time spoofing additional protectionntpd in ntp 42x before 428p7 and 43x before 4392 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an ...
A flaw was found in ntpd making it vulnerable to Sybil attacks An authenticated attacker could target systems configured to use a trusted key in certain configurations and to create an arbitrary number of associations and subsequently modify a victim's clock ...
ntpd can be vulnerable to Sybil attacks If a system is set up to use a trustedkey and if one is not using the feature introduced in ntp-428p6 allowing an optional 4th field in the ntpkeys file to specify which IPs can serve time, a malicious authenticated peer -- ie one where the attacker knows the private symmetric key -- can create arbitrar ...