ICS Advisory

Network Time Protocol Vulnerabilities (Supplement)

Last Revised
Alert Code
ICSA-14-353-01 (Supplement)

OVERVIEW

This advisory supplement is to accompany the NCCIC/ICS-CERT advisory titled ICSA-14-353-01 Network Time Protocol Vulnerabilities that was published December 19, 2014, on the ICS‑CERT web site.

Please refer to the original advisory for all the details of the vulnerabilities. The purpose of this advisory supplement is to document which products are affected by these vulnerabilities and suggest how users of these products may mitigate the effects of these vulnerabilities. This document will be updated as needed.

ICS-CERT thanks the following companies for responding to our inquiry on the affected products (listed vendors may have answered yes or no):

Arbiter, Catapult Software, Codesys, Ecava IntegraXor, Festo, Innominate, KEP (Kessler-Ellis Products), Meinberg, Microsys, spol. s r.o., Nordex Energy GmbH, Pepperl+Fuchs GmbH, Progea, Red Lion, Roche Diagnostics GmbH, SELINC, Sielcosistemi, Siemens, Sierra Wireless, SUBNET, Trihedral Engineering Limited, and Wind River Systems.

ICS-CERT encourages any asset owners/operators, developers, or vendors to coordinate known implementations of the affected products directly with ICS-CERT.

AFFECTED PRODUCTS

Arbiter Systems products:

  • Clock products using the network card. Arbiter has deployed a new firmware based on NTP Version 4.2.8

Innomoninate products:

  • mGuard Firmware Version 7.0 should be upgraded to Version 7.6.7
  • mGuard Firmware Version 8.0 should be upgraded to Version 8.1.5

Meinberg products:

  • Please see Meinberg’s public notification and mitigation strategies at:

Siemens products:

  • Please see Siemens’s public notification and mitigation strategies at SSA-671683 NTP Vulnerabilities in Ruggedcom ROX-based Devices (Published January 19, 2015), located at www.siemens.com/cert/advisories. This Security notification will be updated soon to include new firmware updates.

Wind River System products:

  • News updates for Wind River VxWorks:

There are patches for WR Linux for the other (related) CVEs (2014-9293 - 9286) available at  https://knowledge.windriver.com/?title=Content_Lookup&id=044772:

  • VxWorks 7
  • VxWorks 6.9
  • WR Linux 4.3.0.X
  • WR Linux 5.0.1.x
  • WR Linux 6.0.0.x
  • WR Linux 7.0.0.x

This product is provided subject to this Notification and this Privacy & Use policy.

Vendor

Other