PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-5117 Openntpd CVE debrief

CVE-2016-5117 affects OpenNTPD before 6.0p1. The issue is a missing validation check for the CN on HTTPS constraint requests, which can let a remote attacker bypass intended man-in-the-middle protections by supplying a crafted timestamp constraint that uses a valid certificate. This is an integrity-impacting flaw rather than a code-execution issue.

Vendor
Openntpd
Product
CVE-2016-5117
CVSS
MEDIUM 5.9
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-31
Original CVE updated
2026-05-13
Advisory published
2017-01-31
Advisory updated
2026-05-13

Who should care

Administrators and operators running OpenNTPD versions before 6.0p1, especially environments that rely on HTTPS constraint requests as part of their time-synchronization trust model or MITM mitigation.

Technical summary

NVD describes the flaw as OpenNTPD failing to validate the certificate common name (CN) for HTTPS constraint requests. Because the request can be made with a valid certificate but an inappropriate constraint target, the normal MITM mitigation can be bypassed. NVD maps the weakness to CWE-254 and rates the issue CVSS v3.0 5.9/Medium (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Defensive priority

Medium priority. Patch promptly if you run affected OpenNTPD releases, but the issue is narrower than broad wormable vulnerabilities because exploitation requires specific HTTPS constraint handling and a crafted constraint request.

Recommended defensive actions

  • Upgrade OpenNTPD to 6.0p1 or later as indicated by the vendor advisory and NVD description.
  • Confirm whether your deployment uses HTTPS constraint requests and, if so, treat affected pre-6.0p1 systems as exposed until updated.
  • Apply the vendor patch or equivalent fixed package referenced in the OpenBSD/OpenNTPD advisory materials.
  • Review dependency and package inventories for embedded or appliance builds that may include older OpenNTPD versions.

Evidence notes

Supported by the NVD record and the referenced vendor materials. The NVD description states that OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, enabling bypass of MITM mitigations via a crafted timestamp constraint with a valid certificate. The record also lists a patch diff, a vendor advisory, and two OSS-security mailing list references. NVD assigns CVSS v3.0 vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N and CWE-254. The supplied CVE publish date is 2017-01-31; the NVD record was modified on 2026-05-13.

Official resources

CVE published by the CVE/NVD record on 2017-01-31T19:59:00.230Z; the supplied source record was last modified on 2026-05-13T00:24:29.033Z. Referenced patch and mailing-list materials in the source set date to May 2016.