SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Unified Computing System Vendors:   Cisco
(Cisco Issues Advisory for Cisco UCS Central) Ntpd MAC Checking Failure Lets Remote Users Bypass Authentication
SecurityTracker Alert ID:  1032074
SecurityTracker URL:  http://securitytracker.com/id/1032074
CVE Reference:   CVE-2015-1798   (Links to External Site)
Date:  Apr 10 2015
Impact:   Host/resource access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Ntpd. A remote user can bypass authentication on the target system. Cisco UCS Central is affected.

When configured for symmetric key authentication, the system accepts packets that do not contain a message authentication code (MAC) as valid packets. A remote user with the ability to conduct a man-in-the-middle attack can send a specially crafted spoofed packet that does not contain a MAC value to bypass authentication.

Authentication using autokey is not affected.

Miroslav Lichvar of Red Hat reported this vulnerability.

Impact:   A remote user can bypass authentication on the target system.
Solution:   Cisco has issued an advisory for Cisco UCS Central.

Cisco has assigned bug ID CSCut77422 to this vulnerability.

The Cisco advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd

Vendor URL:  support.ntp.org/bin/view/Main/SecurityNotice#ntpd_accepts_unauthenticated_pac (Links to External Site)
Cause:   Authentication error

Message History:   This archive entry is a follow-up to the message listed below.
Apr 7 2015 Ntpd MAC Checking Failure Lets Remote Users Bypass Authentication



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC