The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26076

CVE-2026-26076: ntpd-rs NTS DoS Vulnerability

CVE-2026-26076 is a denial of service vulnerability in ntpd-rs that allows attackers to increase CPU usage through malformed NTS packets. This article covers the technical details, affected versions, impact, and mitigation.

Published: February 13, 2026

CVE-2026-26076 Overview

CVE-2026-26076 is a resource exhaustion vulnerability in ntpd-rs, a full-featured implementation of the Network Time Protocol written in Rust. Prior to version 1.7.1, an attacker can remotely induce moderate increases (2-4 times above normal) in CPU usage by exploiting the NTS (Network Time Security) implementation. When NTS is enabled on an ntpd-rs server, an attacker can craft malformed NTS packets that request a large number of cookies, causing the server to expend significantly more computational effort processing responses.

Critical Impact

Remote attackers can degrade ntpd-rs server performance through malformed NTS packet requests, potentially affecting time synchronization services for dependent infrastructure.

Affected Products

  • ntpd-rs versions prior to 1.7.1
  • Systems running ntpd-rs with NTS (Network Time Security) enabled

Discovery Timeline

  • February 12, 2026 - CVE-2026-26076 published to NVD
  • February 12, 2026 - Last updated in NVD database

Technical Details for CVE-2026-26076

Vulnerability Analysis

This vulnerability is classified as CWE-770 (Allocation of Resources Without Limits or Throttling). The core issue lies in how ntpd-rs handles NTS cookie requests within incoming packets. When NTS is enabled, the server processes cookie requests as part of the NTS-KE (Key Establishment) protocol. An attacker can exploit this by crafting NTS packets that request an excessive number of cookies in a single request, forcing the server to perform cryptographic operations for each requested cookie without adequate resource limits.

The impact is a denial of service condition where CPU utilization increases moderately (2-4 times normal levels), which can degrade server performance and affect time synchronization accuracy for clients depending on the affected server. While not a complete service disruption, this degradation can be significant in environments where precise time synchronization is critical.

Root Cause

The root cause is the absence of proper resource allocation limits when processing NTS cookie requests. The server did not enforce a reasonable maximum on the number of cookies that could be requested in a single NTS packet, allowing attackers to submit requests that consume disproportionate CPU resources relative to legitimate traffic patterns.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker with network access to the ntpd-rs server can send specially crafted NTS packets containing malformed cookie requests. The attack exploits the asymmetric cost between sending a malicious request (low computational cost for attacker) versus processing it (higher computational cost for server).

The vulnerability mechanism involves sending NTS packets with inflated cookie request counts. When the server attempts to generate and encrypt cookies for each request, the cryptographic operations accumulate, consuming CPU cycles. By sustaining a stream of such malformed packets, an attacker can maintain elevated CPU usage on the target server, degrading its ability to serve legitimate NTP clients.

For detailed technical information about the vulnerability and fix, see the GitHub Security Advisory GHSA-c7j7-rmvr-fjmv.

Detection Methods for CVE-2026-26076

Indicators of Compromise

  • Abnormal CPU utilization spikes (2-4x normal) on ntpd-rs servers with NTS enabled
  • Increased volume of NTS-KE protocol traffic from unusual sources
  • NTP response latency increases for legitimate clients
  • Log entries indicating malformed or unusual NTS packet processing

Detection Strategies

  • Monitor CPU utilization patterns on ntpd-rs servers, alerting on sustained increases above baseline
  • Implement network monitoring to detect anomalous NTS traffic volumes or patterns
  • Deploy intrusion detection rules to identify NTS packets with unusually high cookie request counts
  • Correlate NTP server performance metrics with incoming connection sources to identify potential attackers

Monitoring Recommendations

  • Establish baseline CPU metrics for ntpd-rs processes and configure alerts for deviations
  • Enable verbose logging for NTS operations to capture details about incoming requests
  • Monitor network traffic to NTS-enabled ports (typically UDP 123 and TCP 4460) for volumetric anomalies
  • Implement rate limiting at the network perimeter for NTP and NTS traffic

How to Mitigate CVE-2026-26076

Immediate Actions Required

  • Upgrade ntpd-rs to version 1.7.1 or later immediately
  • Review server configurations to identify all instances running NTS-enabled ntpd-rs
  • Consider temporarily disabling NTS if upgrade cannot be performed immediately and time security is not critical
  • Implement network-level rate limiting for NTP/NTS traffic as a compensating control

Patch Information

The vulnerability has been fixed in ntpd-rs version 1.7.1. The fix introduces proper limits on NTS cookie request processing to prevent resource exhaustion attacks.

  • Fixed Version:1.7.1
  • Release:GitHub Release v1.7.1
  • Commit:fa73af14d17b666b1142b9fee3ba22c18a841d24

Workarounds

  • Implement rate limiting at the network firewall or load balancer level for NTS traffic
  • Temporarily disable NTS functionality if time synchronization security is not required
  • Deploy ntpd-rs servers behind reverse proxies or network appliances that can filter malformed packets
  • Increase server resources (CPU allocation) as a temporary measure to absorb attack impact
bash
# Example: Rate limiting NTS traffic with iptables
# Limit NTS-KE connections to 10 per second per source IP
iptables -A INPUT -p tcp --dport 4460 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 4460 -m state --state NEW -m recent --update --seconds 1 --hitcount 10 -j DROP

# Alternative: Upgrade ntpd-rs to patched version
# Using cargo (if installed from source)
cargo install ntpd-rs --version 1.7.1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechNtpd Rs

  • SeverityMEDIUM

  • CVSS Score6.9

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-770
  • Technical References
  • GitHub Commit Update

  • GitHub Release v1.7.1

  • GitHub Security Advisory GHSA-c7j7-rmvr-fjmv
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English