cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3853
Views
5
Helpful
2
Replies

Nessus Vulnerability: The remote NTP server responds to mode 6 queries.

pozoteleco
Level 1
Level 1

In a recent auditory, the cibersecurity department found this vulnerability:

 

The remote NTP server responds to mode 6 queries. Devices that respondto these queries have the potential to be used in NTP amplificationattacks. An unauthenticated. remote attacker could potentially exploitthis. via a specially crafted mode 6 query. to cause a reflecteddenial of service condition.

 

How to solve this?

 

I have the following configuration in the Core Network device for NTP service:

 

ntp allow mode control 10
ntp master 3
ntp update-calendar
ntp server X.X.X.X maxpoll 15 minpoll 10
ntp server hora.roa.es minpoll 10 prefer

2 Replies 2

Seb Rupik
VIP Alumni
VIP Alumni

Hi there,

Check one of the bug listings around this vulnerability. Your immediate options are to implement NTP access-groups, interfaces ACLs and CoPP. All of this are susceptible to source address spoofing.

The real fix is to upgrade your system software to a version which supports the command:

!
ntp allow mode control xx
!

 

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCum44673/?rfs=iqvred

 

cheers,

Seb.


Thanks Seb!