
We found results for “”
CVE-2025-58066
Good to know:


Date: August 29, 2025
nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. In versions between 1.2.0 and 1.6.1 inclusive servers which allow non-NTS traffic are affected by a denial of service vulnerability, where an attacker can induce a message storm between two NTP servers running ntpd-rs. Client-only configurations are not affected. Affected users are recommended to upgrade to version 1.6.2 as soon as possible.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Insufficient Control of Network Message Volume (Network Amplification)
CWE-406Top Fix

Upgrade Version
Upgrade to version ntpd - 1.6.2;https://github.com/pendulum-project/ntpd-rs.git - v1.6.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | LOW |