CVE-2016-1548
Summary
| CVE | CVE-2016-1548 |
|---|---|
| State | PUBLISHED |
| Assigner | certcc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-01-06 21:59:00 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. |
Risk And Classification
Primary CVSS: v3.0 7.2 HIGH from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
EPSS: 0.054030000 probability, percentile 0.901930000 (date 2026-05-11)
Problem Types: CWE-19 | unspecified
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 7.2 | HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L |
| 2.0 | [email protected] | Primary | 6.4 | AV:N/AC:L/Au:N/C:N/I:P/A:P |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
ChangedConfidentiality
NoneIntegrity
LowAvailability
LowCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:N/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | NTP Project | NTP | affected 4.2.8p4 | Not specified |
| CNA | NTPsec Project | NTPSec | affected aa48d001683e5b791a743ec9c575aaf7d867a2b0c | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| openSUSE-SU-2016:1423-1: moderate: Security update for ntp | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016 | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | |
| Siemens TIM 4R-IE Devices | CISA | af854a3a-2127-422b-91ae-364da2661108 | us-cert.cisa.gov | |
| Cisco Talos - Talos 2016 0082 | af854a3a-2127-422b-91ae-364da2661108 | www.talosintelligence.com | Exploit, Third Party Advisory |
| [security-announce] SUSE-SU-2016:1912-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| [security-announce] SUSE-SU-2016:1568-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| April 2016 Network Time Protocol Daemon (ntpd) Vulnerabilities in Multiple NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| Vulnerability Note VU#718152 - NTP.org ntpd contains multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | |
| security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc | af854a3a-2127-422b-91ae-364da2661108 | security.FreeBSD.org | |
| [SECURITY] Fedora 24 Update: ntp-4.2.6p5-40.fc24 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Security Advisory 0019 - Arista | af854a3a-2127-422b-91ae-364da2661108 | www.arista.com | |
| [security-announce] SUSE-SU-2016:1278-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| NTP: Multiple vulnerabilities (GLSA 201607-15) — Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| ntp Multiple Bugs Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, Modify Time, and Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| [security-announce] SUSE-SU-2016:1471-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| [security-announce] SUSE-SU-2016:1291-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| [SECURITY] Fedora 23 Update: ntp-4.2.6p5-40.fc23 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Slackware Security Advisory - ntp Updates ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Debian -- Security Information -- DSA-3629-1 ntp | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| [security-announce] openSUSE-SU-2016:1329-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| [security-announce] SUSE-SU-2016:2094-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Oracle Linux Bulletin - April 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| TALOS-2016-0082 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence | af854a3a-2127-422b-91ae-364da2661108 | www.talosintelligence.com | |
| USN-3096-1: NTP vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Debian -- Security Information -- DSA-3629-1 ntp | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| NTP CVE-2016-1548 Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Siemens SIMATIC NET CP 443-1 OPC UA | CISA | af854a3a-2127-422b-91ae-364da2661108 | us-cert.cisa.gov | |
| Oracle Solaris Bulletin - April 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.