CVE-2025-58066
Rust vulnerability analysis and mitigation

Overview

CVE-2025-58066 affects ntpd-rs, a tool for synchronizing computer clocks that implements NTP and NTS protocols. The vulnerability was discovered and disclosed on August 29, 2025, affecting versions between 1.2.0 and 1.6.1 inclusive. The issue specifically impacts servers that allow non-NTS traffic, while client-only configurations remain unaffected (GitHub Advisory).

Technical details

The vulnerability is classified as a denial of service issue with a CVSS v3.1 base score of 5.3 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The technical root cause stems from the server incorrectly responding to all NTP messages sent to the server's port with a time reply, including responses from other servers. This implementation flaw has been categorized under CWE-406 (Insufficient Control of Network Message Volume) (NVD, GitHub Advisory).

Impact

When exploited, the vulnerability allows an attacker to induce a message storm between two NTP servers running ntpd-rs. By using spoofed IP addresses, attackers can cause servers to continuously respond to each other, resulting in significant resource consumption (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to version 1.6.2. For cases where immediate upgrading isn't possible, several workarounds are available: whitelisting access to only client IP addresses using the ignore filter method, blocking incoming non-request traffic on the NTP server port via firewall, disabling public access to the vulnerable NTP server, or disabling the server functionality by removing [server] sections from the configuration (GitHub Advisory).

Community reactions

The vulnerability was discovered and reported by Eric Sesterhenn from X41 D-Sec GmbH, demonstrating active security research in the NTP implementation space (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management