CVE-2015-1798
Description
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NTP ntpd before 4.2.8p2 allows authentication bypass in symmetric-key mode when MAC field is omitted, enabling MITM spoofing.
Vulnerability
The symmetric-key authentication mechanism in ntpd's receive function (ntp_proto.c) in NTP versions 4.x before 4.2.8p2 only requires a correct Message Authentication Code (MAC) if the MAC field has a nonzero length. This flaw allows an attacker to bypass authentication by simply omitting the MAC field from packets [1][3][4].
Exploitation
An attacker with a man-in-the-middle position can send crafted NTP packets with a zero-length MAC field to a vulnerable ntpd that is configured for symmetric-key authentication. The server incorrectly accepts these packets as authentic, as the MAC validation is skipped [1][3].
Impact
Successful exploitation enables the attacker to spoof NTP packets, potentially altering the target's system time. This can lead to disruption of time-sensitive services, certificate validation issues, or other time-based attacks. Authentication controls are effectively bypassed [1][3][4].
Mitigation
The vulnerability is fixed in NTP version 4.2.8p2, released on 2015-04-07. Red Hat released RHSA-2015-1459 for affected systems, Cisco published advisory cisco-sa-20150408-ntpd, and Apple included the fix in OS X Yosemite v10.10.4. Users should upgrade to the patched version. No workaround is recommended; cryptographic network filtering may reduce risk but is not a complete solution [1][2][3][4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
7- Range: >=4.0, <4.2.8p2
- osv-coords4 versionspkg:rpm/opensuse/ntp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012
< 4.2.8p9-1.1+ 3 more
- (no CPE)range: < 4.2.8p9-1.1
- (no CPE)range: < 4.2.6p5-44.1
- (no CPE)range: < 4.2.6p5-44.1
- (no CPE)range: < 4.2.6p5-44.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- support.ntp.org/bin/view/Main/SecurityNoticenvdVendor Advisory
- www.kb.cert.org/vuls/id/374268nvdThird Party AdvisoryUS Government Resource
- bugs.ntp.org/show_bug.cginvd
- lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-04/msg00052.htmlnvd
- marc.infonvd
- rhn.redhat.com/errata/RHSA-2015-1459.htmlnvd
- support.apple.com/kb/HT204942nvd
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpdnvd
- tools.cisco.com/security/center/viewAlert.xnvd
- www.debian.org/security/2015/dsa-3223nvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/73951nvd
- www.securitytracker.com/id/1032032nvd
- www.ubuntu.com/usn/USN-2567-1nvd
- kc.mcafee.com/corporate/indexnvd
- security.gentoo.org/glsa/201509-01nvd
News mentions
0No linked articles in our index yet.