#VU10798 Information disclosure in Network Time Protocol


Published: 2021-06-17

Vulnerability identifier: #VU10798

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-7182

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Network Time Protocol
Server applications / Other server solutions

Vendor: ntp.org

Description

The vulnerability allows a remote unautheticated attacker to obtain potentially sensitive information.

The weakness exists due to insufficient validation user-supplied input. A remote attacker can submit a specially crafted mode 6 packet and gain access to potentially sensitive information.

Mitigation

Update to version ntp-4.2.8p11.

Vulnerable software versions

Network Time Protocol: 4.2.8p6 - 4.2.8p10


External links
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
http://www.ntp.org/downloads.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability