7.4
CVSSv3

CVE-2021-22212

Published: 08/06/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens the key, or fails to load these keys entirely, depending on the key type and the placement of the '#'. This results in the administrator not being able to use the keys as expected or the keys are shorter than expected and easier to brute-force, possibly resulting in MITM attacks between ntp clients and ntp servers. For short AES128 keys, ntpd generates a warning that it is padding them.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntpsec ntpsec 1.2.0

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #989847 CVE-2021-22212 Package: ntpsec; Maintainer for ntpsec is Richard Laager <rlaager@debianorg>; Source for ntpsec is src:ntpsec (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 14 Jun 2021 19:03:00 UTC Severity: important Tags: fixed-upstream, security, ...