This security advisory addresses CVE-2015-7704, CVE-2015-7705, and CVE-2015-7871 as they pertain to A10 ACOS software.
On October 21st, the NTP Project, released version ntp-4.2.8p4, which among other changes, addresses 13 security vulnerabilities, namely: CVE-2015-7704, CVE-2015-7705, CVE-2015-7871, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855. Most of the vulnerabilities are ranked at “low” and “medium” level and are described in details in their security advisory.
Out of the 13 vulnerabilities only 3 affect ACOS:
The following CVEs do not affect ACOS:
The A10 QA team has not been able to cause either of those outcomes however patches are being proactively released due to the potential severity of the issue.
In regular deployments NTP is only exposed on the management interface and is only supposed to talk to a particular NTP server. This limits the exposure significantly. In addition, it is recommended that access is further limited through Access Control Lists (ACLs). Furthermore, perimeter ACLs should be used to ensure spoofed packets cannot enter the perimeter of the network and impersonate legitimate clients.
Software updates resolving this vulnerability will be published at the following URL when available: click here
The following table summarizes update versions resolving all of the above CVEs.
Vulnerable Release |
Resolved Release |
2.7.1-GR1 |
2.7.1-GR1-P1 |
2.7.2-Px |
2.7.2-P8 |
2.8.2-Px |
2.8.2-P4 |
3.x |
3.3.03 |
4.x |
4.2.04 |
Affected Platforms: ADC, CGN, TPS
Affected Software Versions: 4.x, 3.x, 2.7.2-Px, 2.7.1-GR1, 2.8.2-Px
Vulnerability ID | Vulnerability Description |
---|
Ref # | General Link |
---|
Revision | Date | Description |
---|---|---|
1.0 | April 18, 2018 |
Created web page |