CVE-2015-8139
Description
ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2015-8139 allows unauthenticated remote attackers to leak origin timestamps from ntpq/ntpdc, enabling peer impersonation.
Vulnerability
ntpq and ntpdc in NTP before 4.2.8p7 disclose the origin timestamp to unauthenticated clients. The origin timestamp is a critical value used by clients to validate that a response matches their last request; leaking it allows an off-path attacker to forge responses that pass this check. This affects all NTP 4.x releases up to but not including 4.2.8p7 [1][3][4].
Exploitation
An attacker with network access to an NTP client can send ntpq or ntpdc queries to obtain the origin timestamp. No authentication is required. With the origin timestamp in hand, the attacker can craft spoofed NTP response packets that include the correct origin timestamp, thereby impersonating a legitimate peer. Note that ntpdc queries are disabled by default, but ntpq queries are commonly enabled [4].
Impact
Successful exploitation allows an attacker to impersonate a legitimate NTP peer and inject forged time responses. This can shift the client's time, leading to incorrect time synchronization, or cause a denial of service by disrupting timekeeping. The vulnerability is classified as an information disclosure (CWE-200) that enables further attacks such as replay or time manipulation [1][3].
Mitigation
The vulnerability is fixed in NTP version 4.2.8p7, released on 26 April 2016 [4]. Users should upgrade to this version or later. Workarounds include configuring restrict statements to limit which hosts can issue ntpq and ntpdc queries, using multiple time sources to reduce the impact of a single compromised peer, and monitoring NTP instances for suspicious activity. Cisco and FreeBSD have released software updates addressing this issue [1][2].
- Cisco Security Advisory: Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: January 2016
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
- CERT/CC Vulnerability Note VU#718152
- NTP BUG 2946: Origin Leak: ntpq and ntpdc Disclose Origin Timestamp to Unauthenticated Clients
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
26- osv-coords24 versionspkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Manager%202.1pkg:rpm/suse/ntp&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/ntp&distro=SUSE%20OpenStack%20Cloud%205pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
< 4.2.8p6-46.5.2+ 23 more
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 2.17.14.1-1.12.1
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlnvdThird Party Advisory
- support.ntp.org/bin/view/Main/NtpBug2946nvdVendor Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdnvdThird Party Advisory
- www.securityfocus.com/bid/82105nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034782nvdThird Party AdvisoryVDB Entry
- bto.bluecoat.com/security-advisory/sa113nvdThird Party Advisory
- security.gentoo.org/glsa/201607-15nvdThird Party Advisory
- www.kb.cert.org/vuls/id/718152nvdThird Party AdvisoryUS Government Resource
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3EYJQHJZ2KTVQ7ICEFHXTLZ36MRASWX/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORAMN3Q7TVJ54MBYF75XCJOE3DP7LYHT/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNWGCQLW2VY72NIUYMJOCAKJKTXHDUK2/nvd
- security.freebsd.org/advisories/FreeBSD-SA-16:09.ntp.ascnvd
- security.netapp.com/advisory/ntap-20200204-0003/nvd
News mentions
0No linked articles in our index yet.