CVE-2025-58066
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-09-02
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pendulum-project | ntpd-rs | 1.2.0 |
| pendulum-project | ntpd-rs | 1.6.1 |
| pendulum-project | ntpd-rs | 1.6.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-406 | The product does not sufficiently monitor or control transmitted network traffic volume, so that an actor can cause the product to transmit more traffic than should be allowed for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects ntpd-rs versions 1.2.0 through 1.6.1 when servers allow non-NTS traffic. An attacker can cause a denial of service by inducing a message storm between two NTP servers running ntpd-rs. Client-only configurations are not affected.
How can this vulnerability impact me? :
The vulnerability can cause a denial of service condition on affected NTP servers, potentially disrupting time synchronization services. This could impact systems relying on accurate timekeeping and availability of NTP services.
What immediate steps should I take to mitigate this vulnerability?
Upgrade ntpd-rs to version 1.6.2 or later as soon as possible to mitigate the denial of service vulnerability.