PatchSiren cyber security CVE debrief
CVE-2015-8140 Ntp CVE debrief
CVE-2015-8140 describes a weakness in NTP’s ntpq protocol that can enable replay attacks if an attacker can observe network traffic. The issue is rated medium severity in NVD, with no privileges or user interaction required, but with high attack complexity and limited integrity/availability impact.
- Vendor
- Ntp
- Product
- CVE-2015-8140
- CVSS
- MEDIUM 4.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-30
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-30
- Advisory updated
- 2026-05-13
Who should care
Administrators and defenders who run NTP services, especially environments exposing ntpq management traffic across shared, routed, or otherwise monitorable networks. This is most relevant where packet sniffing on the path is plausible or where ntpq traffic is not tightly controlled.
Technical summary
The CVE description states that the ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network. NVD assigns CVSS v3.0 vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L and lists CWE-284. The supplied NVD CPE criteria indicate affected NTP releases in the 4.2.8 family and earlier.
Defensive priority
Medium. The issue is network-reachable and does not require authentication, but exploitation depends on the attacker being able to sniff traffic and on replay conditions, which raises attack complexity. Prioritize systems where ntpq is exposed on untrusted or broadly shared networks.
Recommended defensive actions
- Confirm whether any deployed NTP instances are older than 4.2.8p7 and update to a fixed release or vendor-supported build.
- Restrict access to ntpq and related management traffic to trusted administrative networks only.
- Reduce exposure to traffic sniffing by segmenting management networks and limiting lateral visibility.
- Review firewall and ACL rules so NTP administration endpoints are not reachable from untrusted networks.
- Use vendor and downstream advisories to verify package-specific remediation guidance for your platform.
Evidence notes
The supplied NVD record states that the ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network. NVD also lists CVSS v3.0 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L and CWE-284. The record includes a vendor advisory link and multiple downstream advisories, supporting that this issue was tracked and remediated in vendor ecosystems.
Official resources
-
CVE-2015-8140 CVE record
CVE.org
-
CVE-2015-8140 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2015-8140 was published on 2017-01-30 according to the supplied CVE/NVD timeline. The NVD record was later modified on 2026-05-13; that modified date should not be treated as the original disclosure date.