Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Cisco drops 11 clock-crashing patches for 46 things, probes 142 more

Borg assimilates NTP January update, nixes critical firewall hijack hole

Cisco has patched 11 remote denial-of-service and network time protocol vulnerabilities spanning at least 46 products and is investigating a further 142 offerings which may be affected.

The patch bomb is an ongoing effort to crush the medium-severity CVEs that can allow unauthenticated attackers to mess with NTP servers triggering crashes or altering clocks.

Those 11 bugs were published by the NTP Consortium last week in a disclosure that flew underneath industry radars.

"... versions of [Cisco's Network Time Protocol daemon] package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to create a denial of service condition or modify the time being advertised by a device acting as a network time protocol server," Cisco security wonks say.

"Cisco is currently investigating its product line to determine which products may be affected by these vulnerabilities and the impact on each affected product."

The Borg will assimilate patches over the coming months as vulnerable products are identified.

It says it is not aware of public exploitation but admins should consider it likely that attackers will take advantage of the public disclosure and target the laundry list of exposed networking products from Cisco and other popular vendors yet to apply fixes.

affected products

Patch, patch, patch, patch, patch

In a bid to keep admins frowning, Cisco also dropped a patch for a lone critical authentication bypass vulnerability within its RV220W wireless network firewall.

That hole allows unauthenticated remote attackers to gain admin privileges on network boxen thanks to lax input validation of HTTP request headers.

"An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the management interface of a targeted device," the Borg droned.

"Depending on whether remote management is configured for the device, the management interface may use the SQL code in the HTTP request header to determine user privileges for the device. A successful exploit could allow the attacker to bypass authentication on the management interface and gain administrative privileges on the device." ®

 

Similar topics

TIP US OFF

Send us news


Other stories you might like