CVE-2020-15025
moderate-risk
Published 2020-06-24
ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
Do I need to act?
~
3.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.4/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
8300 Firmware
8700 Firmware
A400 Firmware
References (16)
Issue Tracking
https://bugs.gentoo.org/729458
Third Party Advisory
https://security.gentoo.org/glsa/202007-12
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200702-0002/
Vendor Advisory
https://support.ntp.org/bin/view/Main/NtpBug3661
Issue Tracking
https://bugs.gentoo.org/729458
Third Party Advisory
https://security.gentoo.org/glsa/202007-12
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200702-0002/
Vendor Advisory
https://support.ntp.org/bin/view/Main/NtpBug3661
40
/ 100
moderate-risk
Severity
14/34 · Moderate
Exploitability
6/34 · Minimal
Exposure
20/34 · Moderate