ā05-22-2024 11:07 AM
I have 8 3850 Cisco Switches that have a vulnerability that need to be fixed. The vulnerability is ICMP Timestamp Request Remote Date Disclosure. Essentially what I need to do is filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). I am unsure how to go about this. Any assistance-feedback would be appreciated.
ā05-22-2024 11:22 PM
- FYI : https://community.cisco.com/t5/other-security-subjects/i-need-a-fix-for-cve-1999-0524/m-p/3908354#M149108
https://community.cisco.com/t5/data-center-switches/icmp-timestamp-request-remote-date-disclosure/td-p/5102310
M.
ā06-21-2024 07:51 AM
I have attempted the acls but still receive timestamps on command prompt. how do you correct this? I have looked at both threads and still cannot correctly apply it.
ā06-21-2024 08:23 AM
Both threads describe using an acl applied inbound to filter out the timestamp request. Can you give a some information about your environment and some details about the acl that you configured and how you applied it?
I am not clear what you mean when you say "but still receive timestamps on command prompt" Where are you executing this command prompt?
ā06-21-2024 08:45 AM
ACLs were applied to management vlan interface and did not work for us. They were then applied to the trunk interface and did not work as well. As for command prompt, we tested to see it it worked by going onto command prompt and ping -s the switch.
ā06-24-2024 08:39 AM
I opened a ticket with TAC and they notified me that this vulnerability does not apply to is not Cisco related. It is a Linux based vulnerability. My group accepted it as a false positive/accepted risk. However, if you still want to filter the ICMP you can capture if there is any ICMP 13 and 14 traffic or not by doing the following:
monitor capture TEST interface gig 1/0/1 in control-plane both match ipv4 host <destination IP> host <IP of gig 1/0/1> buffer size 100
monitor capture TEST start
monitor capture TEST stop
show monitor capture buffer brief
no monitor capure TEST
monitor capture TEST interface gig 1/0/1 out control-plane both match ipv4 host <IP of gig 1/0/1> host <destination IP> buffer size 100
monitor capture TEST start
monitor capture TEST stop
show monitor capture buffer brief
ā06-24-2024 08:55 AM
thanks for the reply. we are currently waiting on scans to come back and see if the acls we applied this time have worked.
ā08-14-2024 04:57 PM
Well did it work?
ā09-30-2024 10:28 AM - edited ā09-30-2024 10:30 AM
Here's my setup and it works fine. Nothing comes up on the scans anymore.
Create the extended access-list:
IP access-list extended icmp-timestamps
deny icmp any any timestamp-request
deny icmp any any timestamp-reply
permit ip any any
** you can also use
**deny icmp any any 13 (which = timestamp-request)
**deny icmp any any 14 (which = timestamp-reply)
Make sure you have the allow ip any any on your access list or you'll shut down whatever port you're applying it to.
Now apply the access-list to any vlan that these requests and replies are on - for example:
int vlan1
ip access-group icmp-timestamps in
ip access-group icmp-timestamps out
**This rejects anything timestamp coming in or going out.
Test it on your running config - then do a "wr mem" and forget about it!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide