Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Easily Exploitable NTP Vulnerabilities Put ICS Operators at Risk

Remotely Exploitable NTP Vulnerabilities Put Industrial and Critical Infrastructure Systems at Risk

Remotely Exploitable NTP Vulnerabilities Put Industrial and Critical Infrastructure Systems at Risk

Security researchers Neel Mehta and Stephen Roettger of Google’s Security Team recently discovered vulnerabilities in the Network Time Protocol (NTP), a service that helps synchronize system times over a network, including some flaws that could enable an attacker to take control of or crash a system.

According to the disclosures, several vulnerabilities exist, including buffer overflow vulnerabilities (CVE-2014-9295) that could allow a remote attacker to send a specially crafted request packet that could crash the NTP daemon (ntpd) or execute arbitrary code with the privileges of the NTP user.

The biggest concern is that the vulnerabilities can be easily exploited remotely by a low skilled attacker with exploits that are already publicly available.

NTP VulnerabilitiesMehta, who also discovered the infamous Heartbleed vulnerability, and Roettger coordinated the disclosure of NTP vulnerabilities with CERT/CC, which published a vulnerability note on Friday.

NTP has released an update that addresses several, but not all of the newly-discovered vulnerabilities in the Network Time Protocol daemon. The two most serious issues and four less serious issues were fixed with the release of ntp-4.2.8, which was made available on Dec. 18. The NTP Project said that it expects to fix two less significant vulnerabilities within the next month.

Products using NTP Version 4 releases prior to NTP-4.2.8 are affected, and because the software is a widely used open source protocol, many products from technology vendors will be at risk.

Industrial Control Systems at Risk

The DHS’ Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) also issued an advisory to warn operators of industrial control systems to ensure they are protected against the dangerous flaws.

Advertisement. Scroll to continue reading.

“As NTP is widely used within operational Industrial Control Systems deployments, NCCIC/ICS-CERT is providing this information for US Critical Infrastructure asset owners and operators for awareness and to identify mitigations for affected devices,” ICS-CERT noted it its advisory.

“NTP is indeed a vital component of ICS and SCADA networks,” Bill Rios, an ICS security expert and founder of security startup Laconicly, told SecurityWeek. “Timing is really important and synchronizing components in SCADA networks is extremely important.”

Impact to individual organizations depends on many factors that are unique to each organization, ICS-CERT said, and recommends that organizations evaluate the impact of the vulnerabilities based on their operational environment, architecture, and product implementation.

“I’m certain that many portions of our nations critical infrastructure depend of the integrity of timing services like NTP,” Rios said.

ICS-CERT strongly encourages Critical Infrastructure and Key Resources (CIKR) users to backup current operational ICS configurations, and thoroughly test the updated software for system compatibility on a test system before attempting deployment on operational systems.

NTP was one of the first open source projects selected to receive support from the Linux Foundation’s Core Infrastructure Initiative, an effort supported by a group of tech Industry heavyweights including Microsoft, Google, Intel, and Cisco to support and fund open source projects that make up critical elements of global information infrastructure. Formed primarily as the industry’s response to the Heartbleed crisis, the OpenSSL library and NTP were the initiative’s first projects to receive support.

The latest NTP releases can be found online from the NTP project website

Red Hat released updates over the weekend to address the security issues in NTP packages used in Red Hat Enterprise Linux 5, 6 and 7

OpenBSD is not affected as it does not use ntp.org code.

You can expect many other vendors to release updates in the days and weeks ahead to address these vulnerabilities in products that leverage NTP.

*Headline revised

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.