NETWORK TIME PROTOCOL FORCED INTERLEAVED TIME SPOOFING VULNERABILITY
It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.
CVSSv2: 6.4 – (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVSSv3: 7.2 – CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L