DESCRIPTION LAST UPDATED: 2023-12-18
DEFAULT SEVERITY LEVEL: MEDIUM
This report identifies NTP servers that have the potential to be used in amplification attacks by criminals that wish to perform denial of service attacks.
The NTP version command is a Mode 6 query for READVAR. While not as bad as the Mode 7 query for MONLIST, the queries for READVAR will normally provide around 30x amplification.
To manually test if a system is vulnerable to this, you can use the command:
- Instructions for restricting READVAR for linux hosts can be found here.
- Instructions for restricting READVAR for Cisco gear can be found here.
You can track latest NTP version exposure on our Dashboard.
You can learn more on the report in our NTP Version Report tutorial.
You can learn more on our reports in general in our Overview of Free Public Benefit Shadowserver Reports presentation, which also explains example Use Cases.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
This report has an IPv4 and IPv6 version.
Filename(s): scan_ntp, scan6_ntp