Moxa CVE-2020-11868: NTP Vulnerability in Ethernet Switches

MonitorCVSS 7.5MPSA-258681Apr 20, 2026
Moxa
Summary

This security advisory addresses a vulnerability identified in Ethernet switches. CVE-2020-11868 The Network Time Protocol daemon ( ntpd ) in the Network Time Protocol (NTP) before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp. (Source: cve.org) Since this issue is considered a high severity, users should immediately apply the solutions to mitigate associated security risks. The Identified Vulnerability Type and Potential Impact CVE ID Vulnerability Type Impact CVE-2020-11868 CWE-346: Origin Validation Error An off-path attacker may block unauthenticated synchronization via a server mode packet with a spoofed source IP address Vulnerability Scoring Details CVE ID Base Score Vector Severity Unauthenticated Remote Exploits CVE-2020-11868 CVSS 3.1: 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H High Yes

Exploitability
Some exploitation risk — EPSS score 1.3%
Affected products (1)
ProductAffected VersionsFix Status
Ethernet SwitchesAll versionsNo fix yet
API: /api/v1/advisories/9c3cd516-af01-451b-a214-828ad348745f

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.