CVE-2025-58066Insufficient Control of Network Message Volume (Network Amplification) in Ntpd-rs

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 70.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 29

Description

nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. In versions between 1.2.0 and 1.6.1 inclusive servers which allow non-NTS traffic are affected by a denial of service vulnerability, where an attacker can induce a message storm between two NTP servers running ntpd-rs. Client-only configurations are not affected. Affected users are recommended to upgrade to version 1.6.2 as soon as possible.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

debiandebian/rust-ntpd< rust-ntpd 1.6.2-1 (forky)
crates.iopendulum-project/ntpd-rs1.2.01.6.2
CVEListV5pendulum-project/ntpd-rs>= 1.2.0, < 1.6.2

🔴Vulnerability Details

3
OSV
DoS Vulnerability in ntpd-rs2025-08-29
OSV
CVE-2025-58066: nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols2025-08-29
GHSA
DoS Vulnerability in ntpd-rs2025-08-29

📋Vendor Advisories

1
Debian
CVE-2025-58066: rust-ntpd - nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP ...2025