CVE-2021-22212
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens the key, or fails to load these keys entirely, depending on the key type and the placement of the '#'. This results in the administrator not being able to use the keys as expected or the keys are shorter than expected and easier to brute-force, possibly resulting in MITM attacks between ntp clients and ntp servers. For short AES128 keys, ntpd generates a warning that it is padding them.
ntpkeygen puede generar claves que ntpd no puede analizar. NTPsec versión 1.2.0 permite a ntpkeygen generar claves con caracteres "#". ntpd entonces rellena, acorta la clave, o comete un fallo al cargar estas claves por completo, dependiendo del tipo de clave y la colocación del "#". Esto hace que el administrador no pueda usar las claves como se esperaba o que las claves sean más cortas de lo esperado y más fáciles de forzar, resultando posiblemente en ataques MITM entre clientes ntp y servidores ntp. Para claves AES128 cortas, ntpd genera una advertencia de que las está rellenando
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-05 CVE Reserved
- 2021-06-08 CVE Published
- 2024-02-22 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22212.json | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1955859 | 2023-11-07 | |
https://gitlab.com/NTPsec/ntpsec/-/issues/699 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ntpsec Search vendor "Ntpsec" | Ntpsec Search vendor "Ntpsec" for product "Ntpsec" | 1.2.0 Search vendor "Ntpsec" for product "Ntpsec" and version "1.2.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
|