Description
chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-414-1 | chrony security update |
Debian DLA |
DLA-742-1 | chrony security update |
EUVD |
EUVD-2016-2662 | chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key." |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T23:02:11.769Z
Reserved: 2016-01-08T00:00:00.000Z
Link: CVE-2016-1567
No data.
Status : Modified
Published: 2016-01-26T19:59:08.577
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-1567
OpenCVE Enrichment
No data.
Debian DLA
EUVD