Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26076: CWE-770: Allocation of Resources Without Limits or Throttling in pendulum-project ntpd-rs

0
Medium
VulnerabilityCVE-2026-26076cvecve-2026-26076cwe-770
Published: Thu Feb 12 2026 (02/12/2026, 21:48:44 UTC)
Source: CVE Database V5
Vendor/Project: pendulum-project
Product: ntpd-rs

Description

ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker can remotely induce moderate increases (2-4 times above normal) in cpu usage. When having NTS enabled on an ntpd-rs server, an attacker can create malformed NTS packets that take significantly more effort for the server to respond to by requesting a large number of cookies. This can lead to degraded server performance even when a server could otherwise handle the load. This vulnerability is fixed in 1.7.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 09:06:08 UTC

Technical Analysis

CVE-2026-26076 affects ntpd-rs, a Rust-based full-featured implementation of the Network Time Protocol (NTP). The vulnerability arises from improper resource management in handling NTS (Network Time Security) cookie requests. Specifically, when NTS is enabled, an attacker can craft malformed NTS packets that request an excessive number of cookies. Processing these requests requires significantly more computational effort, leading to a moderate but impactful increase in CPU usage—approximately 2 to 4 times the normal load. This is classified under CWE-770, indicating allocation of resources without limits or throttling. Because the server does not impose limits on the number of cookies requested or the processing effort per request, it becomes susceptible to resource exhaustion attacks. The attack vector is network-based, requiring no authentication or user interaction, making it accessible to remote attackers. While no known exploits are currently in the wild, the vulnerability can degrade server performance and potentially impact the reliability of time synchronization services critical to many infrastructures. The issue was addressed and fixed in ntpd-rs version 1.7.1 by implementing appropriate resource management and throttling mechanisms to prevent excessive CPU consumption from malformed NTS packets.

Potential Impact

The primary impact of CVE-2026-26076 is degraded performance of ntpd-rs servers running vulnerable versions with NTS enabled. Increased CPU usage can lead to slower response times, reduced capacity to handle legitimate NTP requests, and potential denial of service conditions if resource exhaustion becomes severe. Since NTP servers are foundational to network time synchronization, disruptions can cascade to affect time-dependent services such as logging, authentication protocols, transaction ordering, and distributed systems coordination. Organizations relying on ntpd-rs for accurate timekeeping—especially those with high traffic or critical infrastructure—may experience service degradation or outages. The vulnerability does not allow direct code execution or data compromise, but the availability and integrity of time services could be indirectly impacted. This can affect sectors including telecommunications, finance, cloud services, and government networks where precise time synchronization is essential.

Mitigation Recommendations

To mitigate CVE-2026-26076, organizations should upgrade all ntpd-rs deployments to version 1.7.1 or later, where the vulnerability is fixed. For environments where immediate upgrade is not feasible, implement network-level controls such as rate limiting and filtering of NTS packets to restrict the number of cookie requests from individual sources. Monitoring CPU usage and NTP server performance metrics can help detect anomalous spikes indicative of exploitation attempts. Deploying intrusion detection systems with signatures for malformed NTS packets may provide early warning. Additionally, consider isolating NTP servers behind firewalls or dedicated network segments to limit exposure. Regularly audit and update NTP implementations and configurations to ensure security patches are applied promptly. Finally, educate network administrators about the risks of resource exhaustion attacks on time synchronization services and encourage proactive incident response planning.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.901Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e4e5cc9e1ff5ad8206a37

Added to database: 2/12/2026, 10:04:12 PM

Last enriched: 2/20/2026, 9:06:08 AM

Last updated: 3/30/2026, 2:09:14 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses