VYPR
Unrated severityNVD Advisory· Published Apr 8, 2015· Updated May 6, 2026

CVE-2015-1798

CVE-2015-1798

Description

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

NTP ntpd before 4.2.8p2 allows authentication bypass in symmetric-key mode when MAC field is omitted, enabling MITM spoofing.

Vulnerability

The symmetric-key authentication mechanism in ntpd's receive function (ntp_proto.c) in NTP versions 4.x before 4.2.8p2 only requires a correct Message Authentication Code (MAC) if the MAC field has a nonzero length. This flaw allows an attacker to bypass authentication by simply omitting the MAC field from packets [1][3][4].

Exploitation

An attacker with a man-in-the-middle position can send crafted NTP packets with a zero-length MAC field to a vulnerable ntpd that is configured for symmetric-key authentication. The server incorrectly accepts these packets as authentic, as the MAC validation is skipped [1][3].

Impact

Successful exploitation enables the attacker to spoof NTP packets, potentially altering the target's system time. This can lead to disruption of time-sensitive services, certificate validation issues, or other time-based attacks. Authentication controls are effectively bypassed [1][3][4].

Mitigation

The vulnerability is fixed in NTP version 4.2.8p2, released on 2015-04-07. Red Hat released RHSA-2015-1459 for affected systems, Cisco published advisory cisco-sa-20150408-ntpd, and Apple included the fix in OS X Yosemite v10.10.4. Users should upgrade to the patched version. No workaround is recommended; cryptographic network filtering may reduce risk but is not a complete solution [1][2][3][4].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

21

News mentions

0

No linked articles in our index yet.