Medium severity4.8NVD Advisory· Published Jan 30, 2017· Updated May 13, 2026
CVE-2015-8140
CVE-2015-8140
Description
The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlnvdThird Party Advisory
- support.ntp.org/bin/view/Main/NtpBug2947nvdVendor Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdnvdThird Party Advisory
- www.securitytracker.com/id/1034782nvdThird Party AdvisoryVDB Entry
- bto.bluecoat.com/security-advisory/sa113nvdThird Party Advisory
- security.gentoo.org/glsa/201607-15nvdThird Party Advisory
- www.kb.cert.org/vuls/id/718152nvdThird Party AdvisoryUS Government Resource
- security.freebsd.org/advisories/FreeBSD-SA-16:09.ntp.ascnvd
- security.netapp.com/advisory/ntap-20200204-0003/nvd
News mentions
0No linked articles in our index yet.