NTP BUG 2941: NAK to the Future: Symmetric association authentication bypass via crypto-NAK
Last update: April 22, 2024 18:49 UTC (7e7bd5857)
Summary
Description
Crypto-NAK packets can be used to cause ntpd
to accept time from unauthenticated ephemeral symmetric peers by bypassing the authentication required to mobilize peer associations. This vulnerability appears to have been introduced in ntp-4.2.5p186 when the code handling mobilization of new passive symmetric associations (lines 1103-1165) was refactored.
Mitigation
- Implement BCP-38.
- Upgrade to 4.2.8p4 or later.
- If you are unable to upgrade:
- Apply the patch to the bottom of the
authentic
check block around line 1136 of ntp_proto.c
.
- Monitor your
ntpd
instances.
Credit
This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
Timeline