NTP Reflection Attack
NTP versions 4.2.7p25 and earlier with MONLIST support are vulnerable to reflection-based distributed denial-of-service (DDoS) attacks. An attacker can query the MONLIST command using a spoofed source address; the NTP server responds with a large list of recently queried hosts, amplifying the attacker's traffic. This allows the attacker to flood a target network with traffic many times larger than the original query, disrupting network availability and time synchronization. The MONLIST command was historically used for monitoring and debugging but poses a significant amplification risk.
- Network access to NTP port 123 (UDP)
- NTP service with MONLIST command enabled
- Attacker can spoof source IP addresses (true on the public internet)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3d278595-ac19-4482-b8ce-e2af915e74f5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.