CVE-2026-26076
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
12/02/2026
Last modified:
23/02/2026
Description
ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker can remotely induce moderate increases (2-4 times above normal) in cpu usage. When having NTS enabled on an ntpd-rs server, an attacker can create malformed NTS packets that take significantly more effort for the server to respond to by requesting a large number of cookies. This can lead to degraded server performance even when a server could otherwise handle the load. This vulnerability is fixed in 1.7.1.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tweedegolf:ntpd-rs:*:*:*:*:*:rust:*:* | 1.7.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



