Guest

Preview Tool

Cisco Bug: CSCvv07457 - CIAM: ntp 4.2.6p5

Last Modified

Sep 30, 2020

Products (1)

  • Cisco Prime Infrastructure

Known Affected Releases

3.9

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-9293 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
CVE-2014-9294 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
CVE-2014-9295 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
CVE-2014-9296 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
CVE-2014-9750 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
CVE-2014-9751 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9751
CVE-2015-1798 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
CVE-2015-1799 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
CVE-2015-5300 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
CVE-2015-7691 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
CVE-2015-7692 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
CVE-2015-7701 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
CVE-2015-7702 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
CVE-2015-7703 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
CVE-2015-7704 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
CVE-2015-7705 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
CVE-2015-7850 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
CVE-2015-7852 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
CVE-2015-7973 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
CVE-2015-7974 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
CVE-2015-7976 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
CVE-2015-7977 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
CVE-2015-7978 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
CVE-2015-7979 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
CVE-2015-8138 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
CVE-2015-8158 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
CVE-2016-1549 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
CVE-2016-4954 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
CVE-2016-4955 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
CVE-2016-4956 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
CVE-2016-7426 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
CVE-2016-7429 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
CVE-2016-7433 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
CVE-2016-9310 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
CVE-2016-9311 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
CVE-2017-6462 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
CVE-2017-6463 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
CVE-2017-6464 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
CVE-2018-7170 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170
CVE-2018-7185 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
CVE-2019-11331 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11331
CVE-2020-11868 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868
CVE-2020-13817 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.