Vulnerability Description
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | - |
References
- http://www.securityfocus.com/bid/108010Third Party Advisory
- https://support.f5.com/csp/article/K09940637
- https://support.f5.com/csp/article/K09940637?utm_source=f5support&%3Butm_medi
- https://tools.ietf.org/html/draft-gont-ntp-port-randomization-00Third Party Advisory
- http://www.securityfocus.com/bid/108010Third Party Advisory
- https://support.f5.com/csp/article/K09940637
- https://support.f5.com/csp/article/K09940637?utm_source=f5support&%3Butm_medi
- https://tools.ietf.org/html/draft-gont-ntp-port-randomization-00Third Party Advisory
FAQ
What is CVE-2019-11331?
CVE-2019-11331 is a vulnerability with a CVSS score of 8.1 (HIGH). Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
How severe is CVE-2019-11331?
CVE-2019-11331 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11331?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.