Vulnerability Details CVE-2016-1567
chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.3%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 6.8
Products affected by CVE-2016-1567
-
cpe:2.3:a:tuxfamily:chrony:1.0
-
cpe:2.3:a:tuxfamily:chrony:1.1
-
cpe:2.3:a:tuxfamily:chrony:1.18
-
cpe:2.3:a:tuxfamily:chrony:1.19
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.1
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.2
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.3
-
cpe:2.3:a:tuxfamily:chrony:1.20
-
cpe:2.3:a:tuxfamily:chrony:1.21
-
cpe:2.3:a:tuxfamily:chrony:1.23
-
cpe:2.3:a:tuxfamily:chrony:1.23.1
-
cpe:2.3:a:tuxfamily:chrony:1.24
-
cpe:2.3:a:tuxfamily:chrony:1.25
-
cpe:2.3:a:tuxfamily:chrony:1.26
-
cpe:2.3:a:tuxfamily:chrony:1.27
-
cpe:2.3:a:tuxfamily:chrony:1.28
-
cpe:2.3:a:tuxfamily:chrony:1.29
-
cpe:2.3:a:tuxfamily:chrony:1.31
-
cpe:2.3:a:tuxfamily:chrony:1.31.1
-
cpe:2.3:a:tuxfamily:chrony:2.0
-
cpe:2.3:a:tuxfamily:chrony:2.1
-
cpe:2.3:a:tuxfamily:chrony:2.1.1
-
cpe:2.3:a:tuxfamily:chrony:2.2