From: Time sensitive networking security: issues of precision time protocol and its implementation
TLV | Security problem |
---|---|
DISABLE_PORT | Exploitation: Denial of service |
DELAY_MECHANISM | Exploitation: Denial of service |
CLOCK_DESCRIPTION | Reconnaissance: Topology map |
USER_DESCRIPTION | Reconnaissance: Topology map |
PRIORITY1 | Exploitation: BMC tampering |
PRIORITY2 | Exploitation: BMC tampering |
CLOCK_ACCURACY | Exploitation: BMC tampering |