Impact
An attacker can send malformed NTS packets to ntpd-rs, triggering a CPU‑intensive cookie request loop. This causes moderate CPU load increases, degrading service availability. The flaw is a resource exhaustion vulnerability (CWE‑770).
Affected Systems
The vulnerability affects pendulum-project ntpd-rs implementations before version 1.7.1. Any system running ntpd‑rs versions 1.0 through 1.7.0 with NTS enabled is susceptible. Confirm server version and upgrade if needed.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score is below 1 %, suggesting low current exploitation probability, and the issue is not listed in the KEV catalog. However, the flaw is exploitable over the network by sending crafted NTS packets to a reachable ntpd‑rs instance. The required conditions are that NTS be enabled and the server accepts incoming traffic, making the vulnerability remotely exploitable for disruption.
OpenCVE Enrichment