CVE-2026-26076: CWE-770: Allocation of Resources Without Limits or Throttling in pendulum-project ntpd-rs
CVE-2026-26076 is a medium severity vulnerability in ntpd-rs versions prior to 1. 7. 1, related to resource allocation without limits or throttling. When Network Time Security (NTS) is enabled, an attacker can send malformed NTS packets that cause the server to expend excessive CPU resources by requesting a large number of cookies. This results in a 2-4 times increase in CPU usage, potentially degrading server performance and availability. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, affected systems remain at risk until patched. The issue is fixed in ntpd-rs version 1. 7. 1.
AI Analysis
Technical Summary
CVE-2026-26076 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the ntpd-rs implementation of the Network Time Protocol (NTP). The flaw exists in versions prior to 1.7.1 and is triggered when NTS is enabled on the server. An attacker can remotely send malformed NTS packets that request an excessive number of cookies, which are cryptographic tokens used in the NTS protocol to secure time synchronization. Processing these requests causes the server to allocate significantly more CPU resources than normal—approximately 2 to 4 times the typical usage—leading to degraded server performance. This resource exhaustion does not require any authentication or user interaction, making it a network-exploitable vulnerability. The vulnerability could be leveraged to conduct denial-of-service attacks against ntpd-rs servers, potentially impacting the availability of time synchronization services. Precise time synchronization is critical for many networked systems, including financial services, telecommunications, and industrial control systems. The vulnerability was publicly disclosed on February 12, 2026, with a CVSS 4.0 base score of 6.9 (medium severity). No known exploits have been reported in the wild, but the risk remains until systems are updated to version 1.7.1 or later, where the issue is fixed.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on ntpd-rs servers with NTS enabled to maintain accurate and secure time synchronization. Increased CPU usage caused by malformed NTS packets can degrade server performance, potentially leading to partial or complete denial of time synchronization services. This can disrupt time-dependent operations such as logging, authentication, transaction timestamping, and network coordination. Critical sectors such as financial institutions, telecommunications providers, energy grids, and transportation systems could experience operational disruptions or reduced reliability. Additionally, degraded time services can indirectly affect security monitoring and incident response capabilities that rely on accurate timestamps. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can have cascading effects on business continuity and regulatory compliance within Europe.
Mitigation Recommendations
European organizations should immediately upgrade all ntpd-rs deployments to version 1.7.1 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, organizations should consider disabling NTS on ntpd-rs servers as a temporary mitigation, understanding this reduces the security of time synchronization. Network-level protections such as rate limiting and filtering malformed or suspicious NTS packets can help reduce the risk of exploitation. Monitoring CPU usage patterns on ntpd-rs servers can provide early detection of potential exploitation attempts. Organizations should also review and harden firewall rules to restrict access to NTP services to trusted networks or IP ranges. Finally, integrating ntpd-rs servers into broader security monitoring and incident response workflows will help detect and respond to anomalous activity related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2026-26076: CWE-770: Allocation of Resources Without Limits or Throttling in pendulum-project ntpd-rs
Description
CVE-2026-26076 is a medium severity vulnerability in ntpd-rs versions prior to 1. 7. 1, related to resource allocation without limits or throttling. When Network Time Security (NTS) is enabled, an attacker can send malformed NTS packets that cause the server to expend excessive CPU resources by requesting a large number of cookies. This results in a 2-4 times increase in CPU usage, potentially degrading server performance and availability. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, affected systems remain at risk until patched. The issue is fixed in ntpd-rs version 1. 7. 1.
AI-Powered Analysis
Technical Analysis
CVE-2026-26076 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the ntpd-rs implementation of the Network Time Protocol (NTP). The flaw exists in versions prior to 1.7.1 and is triggered when NTS is enabled on the server. An attacker can remotely send malformed NTS packets that request an excessive number of cookies, which are cryptographic tokens used in the NTS protocol to secure time synchronization. Processing these requests causes the server to allocate significantly more CPU resources than normal—approximately 2 to 4 times the typical usage—leading to degraded server performance. This resource exhaustion does not require any authentication or user interaction, making it a network-exploitable vulnerability. The vulnerability could be leveraged to conduct denial-of-service attacks against ntpd-rs servers, potentially impacting the availability of time synchronization services. Precise time synchronization is critical for many networked systems, including financial services, telecommunications, and industrial control systems. The vulnerability was publicly disclosed on February 12, 2026, with a CVSS 4.0 base score of 6.9 (medium severity). No known exploits have been reported in the wild, but the risk remains until systems are updated to version 1.7.1 or later, where the issue is fixed.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on ntpd-rs servers with NTS enabled to maintain accurate and secure time synchronization. Increased CPU usage caused by malformed NTS packets can degrade server performance, potentially leading to partial or complete denial of time synchronization services. This can disrupt time-dependent operations such as logging, authentication, transaction timestamping, and network coordination. Critical sectors such as financial institutions, telecommunications providers, energy grids, and transportation systems could experience operational disruptions or reduced reliability. Additionally, degraded time services can indirectly affect security monitoring and incident response capabilities that rely on accurate timestamps. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can have cascading effects on business continuity and regulatory compliance within Europe.
Mitigation Recommendations
European organizations should immediately upgrade all ntpd-rs deployments to version 1.7.1 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, organizations should consider disabling NTS on ntpd-rs servers as a temporary mitigation, understanding this reduces the security of time synchronization. Network-level protections such as rate limiting and filtering malformed or suspicious NTS packets can help reduce the risk of exploitation. Monitoring CPU usage patterns on ntpd-rs servers can provide early detection of potential exploitation attempts. Organizations should also review and harden firewall rules to restrict access to NTP services to trusted networks or IP ranges. Finally, integrating ntpd-rs servers into broader security monitoring and incident response workflows will help detect and respond to anomalous activity related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-10T18:01:31.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698e4e5cc9e1ff5ad8206a37
Added to database: 2/12/2026, 10:04:12 PM
Last enriched: 2/12/2026, 10:18:51 PM
Last updated: 2/12/2026, 11:09:42 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-70092: n/a
HighCVE-2026-26055: CWE-306: Missing Authentication for Critical Function in yokecd yoke
HighCVE-2026-26075: CWE-352: Cross-Site Request Forgery (CSRF) in labring FastGPT
MediumCVE-2025-70845: n/a
HighCVE-2026-26056: CWE-94: Improper Control of Generation of Code ('Code Injection') in yokecd yoke
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.