ICMP Timestamp Request Remote Data Disclosure on Catalyst 9300
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2024 06:54 AM
From an ACAS scan, I am getting the "ICMP Timestamp Request Remote Data Disclosure" (Tenable 10114) from one of my Catalyst 9300 switches. I am currently on IOS XE version 17.13.1. I have five other catalyst 9300s that are not showing this issue. Any idea why one would and other would not? I have compared the configurations on multiple switches with the one that is having this issue and they are all the same.
- Labels:
-
Network Management
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2024 09:01 AM
First i would check the configuraiton between those 2 devices.
One of the suggestion to add ACL :
access-list 10 deny icmp any any timestamp-request
access-list 10 deny icmp any any timestamp-reply
access-list 10 permit ip any any
int gig x/x
ip access-group 10 in
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2024 10:00 AM
- Verify ACL solution offered from @balaji.bandi with for instance :
# hping3 switch-ip-address --icmp --icmp-ts -V
And look into latest advisory software version , if applicable and try again with the above command ,
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2024 01:26 PM
I don't have that configuration on any of my other switches and they are not reporting this issue. All of them are running the same version (17.13.1).

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2024 02:31 PM
Hello,
if you compare the time on all switches, is it exactly the same ? Which version of the plugin are you using (version 1.53 being the latest I believe) ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-10-2024 08:39 AM
I have no idea what version of plugin is being used as I don't do the scans.
I applied this version of ACL on my switch and applied it to my interface vlan that has the switch ip address. Waiting for CS team to rescan:
ip access-list extended 100
deny icmp any any timestamp-request
deny icmp any any timestamp-reply
permit ip any any
int vlan x
ip access-group 100 in
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-12-2024 05:35 AM
keep us how it goes when you have feedback from pen testing team.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-25-2024 08:36 AM
Did that ACL work? I have the same thing going on with our security scanner. I added this access list:
ip access-list ICMP_Timestamp
10 deny icmp any any timestamp-reply
20 deny icmp any any timestamp-request
30 permit ip any any
Then applied it:
interface GigabitEthernet0
ip access-group ICMP_Timestamp in
This resulted in ALL pings matching the timestamp-reply line and being dropped.
It only allows pings when i add:
5 permit icmp any any echo
Which I have a feeling will allow the timestamp lines as well. Its a ISR4431, this seems like odd behavior to me.
