Device ICMP timestamp vulnerability
Warning number: RS-2024-0001
Initial release time: 2024-5-10
Update release time: Released with version plan
Summary:
The remote host responds to ICMP timestamp requests. This allows the attacker to know the date set on the target computer, which could help an unauthenticated remote attacker defeat time-based authentication protocols.
This vulnerability has been assigned the CVE ID: CVE-1999-0524.
The vulnerability information was discovered by the customer when using the Nessus vulnerability scanning tool.
Sphere of influence:
Affected versions and models:
NVR 8.2.3
NVR 8.2.4
IPC 8.2.3
IPC 8.2.4
Name | Version | Model |
---|---|---|
NVR | 8.2.3 | N7XXX N8XXX N63XX N88X N88SX D32XX D33XX2C D33XX D315X D3312X H7004 H32tXX |
NVR | 8.2.4 | Same as above N6312X |
IPC | 8.2.3 | HI3516D NT98562 SSC327DE SSC338Q SSC30KQ SSC335 SSC339G/338G NT98529 NT98525 NT98528 AX620A |
IPC | 8.2.4 | Same as above |
Impact and consequences:
If there are services that authenticate through time, the identity authentication of these services will be weak, making them vulnerable to attacks by remote attackers, which may lead to the crash of the service or even the leakage of privacy.
Vulnerability Rating:
Vulnerabilities are scored using the CVSSv2 scoring system(http://www.first.org/cvss/).
CVSSv3.x and CVSSv4.0 do not give a score
Base Score: 2.1 LOW
Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Technical details:
Vulnerability details:
Allow ICMP information from any host, such as (1) network mask and (2) timestamp.
Temporary workaround:
After reviewing various authentication services, we found that there is no service that completely relies on system time. Secondly, the device time is highly consistent with the world time. Therefore, we will not come up with a workaround for now, and will update it later as planned.
Solution and version update plan:
Solution:
The version is implemented as per the release plan, filtering out ICMP Timestamp Requests (13) and outgoing ICMP Timestamp Replies (14).
No updates for old versions
Version update plan:
Planned update with version 8.2.4
Vulnerability information sources and vulnerability exploitation:
We are not aware of any other public channels publishing the vulnerabilities mentioned in this article, nor are we aware of any cases where the vulnerabilities have been maliciously exploited.
Technical support channels:
Security Advisory Version Revision Information:
NVR8.2.4 version is planned, but the case has not been closed yet
Frequently Asked Questions:
None