Device ICMP timestamp vulnerability


Warning number: RS-2024-0001

Initial release time: 2024-5-10

Update release time: Released with version plan


Summary:

The remote host responds to ICMP timestamp requests. This allows the attacker to know the date set on the target computer, which could help an unauthenticated remote attacker defeat time-based authentication protocols.

This vulnerability has been assigned the CVE ID: CVE-1999-0524.

The vulnerability information was discovered by the customer when using the Nessus vulnerability scanning tool.


Sphere of influence:

Affected versions and models:

NVR 8.2.3
NVR 8.2.4
IPC 8.2.3
IPC 8.2.4

Name Version Model
NVR 8.2.3 N7XXX
N8XXX
N63XX
N88X
N88SX
D32XX
D33XX2C
D33XX
D315X
D3312X
H7004
H32tXX
NVR 8.2.4 Same as above
N6312X
IPC 8.2.3 HI3516D
NT98562
SSC327DE
SSC338Q
SSC30KQ
SSC335
SSC339G/338G
NT98529
NT98525
NT98528
AX620A
IPC 8.2.4 Same as above


Impact and consequences:

If there are services that authenticate through time, the identity authentication of these services will be weak, making them vulnerable to attacks by remote attackers, which may lead to the crash of the service or even the leakage of privacy.


Vulnerability Rating:

Vulnerabilities are scored using the CVSSv2 scoring system(http://www.first.org/cvss/).
CVSSv3.x and CVSSv4.0 do not give a score
Base Score: 2.1 LOW
Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)


Technical details:

Vulnerability details:

Allow ICMP information from any host, such as (1) network mask and (2) timestamp.


Temporary workaround:

After reviewing various authentication services, we found that there is no service that completely relies on system time. Secondly, the device time is highly consistent with the world time. Therefore, we will not come up with a workaround for now, and will update it later as planned.


Solution and version update plan:

Solution:
The version is implemented as per the release plan, filtering out ICMP Timestamp Requests (13) and outgoing ICMP Timestamp Replies (14).
No updates for old versions

Version update plan:
Planned update with version 8.2.4


Vulnerability information sources and vulnerability exploitation:
We are not aware of any other public channels publishing the vulnerabilities mentioned in this article, nor are we aware of any cases where the vulnerabilities have been maliciously exploited.


Technical support channels:

infocollect.sec@gmail.com

Security Advisory Version Revision Information:

NVR8.2.4 version is planned, but the case has not been closed yet


Frequently Asked Questions:
None