
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-26555 is a vulnerability discovered in NTP (Network Time Protocol) version 4.2.8p15, specifically affecting the praecis_parse function in ntpd/refclock_palisade.c. The vulnerability was disclosed on April 11, 2023, and involves an out-of-bounds write condition. This security flaw affects the clock driver for the Trimble Palisade GPS timing receiver (NVD, GitHub Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 6.4 (Medium severity) with the vector string CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The attack requires physical access and is highly complex to execute. The vulnerability specifically affects the clock driver functionality for the Trimble Palisade GPS timing receiver, making it a specialized attack vector (NVD).
The vulnerability can potentially lead to high impacts on confidentiality, integrity, and availability if successfully exploited. However, the actual impact is limited due to the specialized nature of the vulnerability, as it only affects systems using the Trimble Palisade GPS timing receiver (NVD).
The vulnerability has been addressed in NTP version 4.2.8p16. Updates have been released for various distributions, including Fedora 37 and 38. Users are advised to upgrade to the latest version of NTP to mitigate this vulnerability (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."