03-09-2017 09:05 AM - edited 03-08-2019 09:41 AM
Following a scan by our Info Sec team the following vulnerability was picked up on our cisco Nexus 5672UP.
TCP timestamp response
I raised a case with TAC but as there was no CVE ID they couldn't help without any further information.
I have gone back to the Info Sec team for more info but in the meantime has anyone else had/got this vulnerability? How did you resolve?
Regards
Stu
03-11-2017 07:52 PM
I often use TCP timestamps on asymmetric links to increase the throughput and make them more stable.
I can't imagine any modern IP stack still having TCP time stamping vulnerabilities that can be exploited.
I suspect you are worried about issues that have not existed for 10 years.
08-08-2018 10:25 AM
Even i am facing the same problem. Our vulnerability scanner is flagging TCP timestamp response vulnerability on the Cisco Nexus7700 switch. If the scanner is able to determine system boot time then there has to be a rationale for it. Please help us provide a justification on why this finding should be treated as a false positive.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide