3.5
CVSSv2

CVE-2018-7170

Published: 06/03/2018 Updated: 18/06/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.3 | Impact Score: 3.6 | Exploitability Score: 1.6
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

ntpd in ntp 4.2.x prior to 4.2.8p7 and 4.3.x prior to 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp

ntp ntp 4.2.8

synology diskstation manager

synology router manager

synology skynas

synology virtual diskstation manager

synology vs960hd_firmware

netapp hci -

netapp solidfire -

hpe hpux-ntp

Vendor Advisories

ntpd in ntp 42x before 428p7 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an incomplete fix for CVE-2016-1549(CVE-2018-7170) The ntpq and ntpdc command-line ...
Ephemeral association time spoofing additional protectionntpd in ntp 42x before 428p7 and 43x before 4392 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an ...
A flaw was found in ntpd making it vulnerable to Sybil attacks An authenticated attacker could target systems configured to use a trusted key in certain configurations and to create an arbitrary number of associations and subsequently modify a victim's clock ...
ntpd can be vulnerable to Sybil attacks If a system is set up to use a trustedkey and if one is not using the feature introduced in ntp-428p6 allowing an optional 4th field in the ntpkeys file to specify which IPs can serve time, a malicious authenticated peer -- ie one where the attacker knows the private symmetric key -- can create arbitrar ...