NTP Vulnerability Fix

January 15, 2014 – 9:59 am by adame
We are working with our CPE vendor, Pace, to patch a vulnerability in the 4111N CPE that leaves the device vulnerable to NTP amplification attacks.
A patch will be pushed to all Pace 4111Ns on our network as each device checks in with the ACS over the next 24 hours. Rebooting the device will allow the patch to be applied immediately. Connectivity should not be interrupted as a result of this update.
– Adam E. and the Support Team.
Be Sociable, Share!
  1. 3 Responses to “NTP Vulnerability Fix”

  2. Thanks. Any details? Local or remote?

    By Rich on Jan 15, 2014

  3. Nvm, found it on cert http://www.kb.cert.org/vuls/id/348126

    By Rich on Jan 16, 2014

  1. 1 Trackback(s)

  2. Feb 20, 2014: cyber security & profound submersion » Blog Archive » NTP vulnerabilities affect all Hawaiian Telcom Internet service customers, so Hawaiian Telcom blocks all NTP

Post a Comment

Please Note: Blog comments are not intended as a direct support contact. If you are having a technical problem, or something equally time-sensitive, please contact Sonic.net Support by sending an email to support@sonic.net or calling 707-547-3400 (phones open 6am-11pm M-F, 8am-10pm weekends).