cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1971
Views
0
Helpful
2
Replies

tcp timestamp response vulnerability with our Cisco Nexus 5672UP Chassis

stuartwalton
Level 1
Level 1

Following a scan by our Info Sec team the following vulnerability was picked up on our  cisco Nexus 5672UP. 

TCP timestamp response

I raised a case with TAC but as there was no CVE ID they couldn't help without any further information. 

I have gone back to the Info Sec team for more info but in the meantime has anyone else had/got this vulnerability? How did you resolve? 

Regards

Stu

2 Replies 2

Philip D'Ath
VIP Alumni
VIP Alumni

I often use TCP timestamps on asymmetric links to increase the throughput and make them more stable.

I can't imagine any modern IP stack still having TCP time stamping vulnerabilities that can be exploited.

I suspect you are worried about issues that have not existed for 10 years.

Even i am facing the same problem. Our vulnerability scanner is flagging TCP timestamp response vulnerability on the Cisco Nexus7700 switch. If the scanner is able to determine system boot time then there has to be a rationale for it. Please help us provide a justification on why this finding should be treated as a false positive.