Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46673: CWE-913 Improper Control of Dynamically-Managed Code Resources in NASA CryptoLib

0
Medium
VulnerabilityCVE-2025-46673cvecve-2025-46673cwe-913
Published: Sun Apr 27 2025 (04/27/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: NASA
Product: CryptoLib

Description

NASA CryptoLib before 1.3.2 does not check whether the SA is in an operational state before use, possibly leading to a bypass of the Space Data Link Security protocol (SDLS).

AI-Powered Analysis

AILast updated: 06/25/2025, 00:35:47 UTC

Technical Analysis

CVE-2025-46673 is a medium-severity vulnerability identified in NASA's CryptoLib, a cryptographic library used to implement the Space Data Link Security (SDLS) protocol. The vulnerability stems from improper control of dynamically-managed code resources, specifically classified under CWE-913. The issue arises because CryptoLib versions prior to 1.3.2 do not verify whether the Security Association (SA) is in an operational state before use. This lack of validation can lead to a bypass of the SDLS protocol, which is designed to provide confidentiality, integrity, and authentication for space communication links. The vulnerability has a CVSS 3.1 base score of 4.9, indicating a medium severity level. The attack vector is network-based (AV:N), requiring high attack complexity (AC:H), low privileges (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). Although no known exploits are currently reported in the wild, the flaw could allow an attacker with network access and limited privileges to bypass security controls in SDLS, potentially enabling unauthorized access or manipulation of space communication data. This vulnerability is particularly relevant to systems relying on NASA CryptoLib for secure space data transmission, including satellite communication infrastructure and related ground stations.

Potential Impact

For European organizations involved in space technology, satellite communications, or aerospace research, this vulnerability could undermine the security of critical space data links. The bypass of SDLS may allow attackers to intercept or alter sensitive telemetry, command, or control data, potentially disrupting satellite operations or compromising mission integrity. European aerospace agencies, satellite operators, and defense contractors using NASA CryptoLib or derivative technologies could face risks to confidentiality and integrity of their space communication channels. While the direct impact on availability is not indicated, the integrity and confidentiality breaches could lead to operational disruptions or loss of trust in space communication systems. Given the strategic importance of space infrastructure in Europe for navigation, communication, and defense, exploitation of this vulnerability could have cascading effects on national security and commercial satellite services.

Mitigation Recommendations

1. Immediate upgrade to NASA CryptoLib version 1.3.2 or later, where the vulnerability is addressed by proper validation of the Security Association state before use. 2. Implement network segmentation and strict access controls to limit network exposure of systems running vulnerable CryptoLib versions, reducing the attack surface. 3. Employ intrusion detection systems (IDS) and anomaly detection tailored to space communication protocols to identify unusual traffic patterns indicative of SDLS bypass attempts. 4. Conduct regular security audits and code reviews of cryptographic implementations in space communication systems to detect similar resource management issues. 5. Collaborate with NASA and space industry partners to share threat intelligence and patch management best practices specific to space communication security. 6. For organizations unable to immediately patch, consider deploying compensating controls such as additional encryption layers or authentication mechanisms at higher protocol layers to mitigate potential bypass effects.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeecb2

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 12:35:47 AM

Last updated: 10/16/2025, 12:47:31 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats