Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61910: CWE-789: Memory Allocation with Excessive Size Value in nasa-jpl ION-DTN

0
High
VulnerabilityCVE-2025-61910cvecve-2025-61910cwe-789
Published: Tue Oct 07 2025 (10/07/2025, 19:31:33 UTC)
Source: CVE Database V5
Vendor/Project: nasa-jpl
Product: ION-DTN

Description

The NASA’s Interplanetary Overlay Network (ION) is an implementation of Delay/Disruption Tolerant Networking (DTN). A BPv7 bundle with a malformed extension block causes uncontrolled memory allocation inside ION-DTN 4.1.3s, leading to receiver thread termination and a Denial-of-Service (DoS). The triggering bundle contains an extension block starting at `0x85070201005bbb0e20b4ea001a000927c0...`. The first byte in the extension block (0x85) indicates a CBOR array of five elements of which the first four are numbers (0x07, 0x02, 0x01, 0x00) but the fifth element is a byte string of length 27 (`0x5bbb0e20b4ea001a000927c0...`). The vulnerability seems to be due to processing the fifth element of the array (i.e., the byte string) as replacing it with a number makes the vulnerability no longer be triggered. While parsing this extension block, ION obtains a very large block length, which in the code in `bei.c`:764) seems to be passed from `blockLength` which is an unsigned int, to a 32 bit signed integer `blkSize`. The unsigned to signed conversion causes `blkSize` to hold the value of -369092043, which is then converted into a 64-bit unsigned value inside `MTAKE(blkSize)`, resulting in an attempt to allocate an unrealistic amount of memory, causing the error. As of time of publication, no known patched versions of BPv7 exist.

AI-Powered Analysis

AILast updated: 10/07/2025, 20:00:24 UTC

Technical Analysis

CVE-2025-61910 affects NASA JPL's Interplanetary Overlay Network (ION) Delay/Disruption Tolerant Networking (DTN) software version 4.1.3s. The vulnerability is triggered by a malformed BPv7 bundle containing a CBOR-encoded extension block with a specific structure: a five-element array where the fifth element is a byte string of length 27. The ION-DTN software incorrectly processes this byte string, leading to an integer signedness conversion error. The block length is stored as an unsigned int but then cast to a signed 32-bit integer, resulting in a negative value (-369092043). This negative value is subsequently converted to a large 64-bit unsigned integer when passed to the memory allocation function MTAKE(). Consequently, the software attempts to allocate an unrealistic amount of memory, causing the receiver thread to terminate and resulting in a Denial-of-Service (DoS). The vulnerability does not affect confidentiality or integrity but severely impacts availability. The attack vector is network-based, requiring no privileges or user interaction, making it easily exploitable remotely. No patches or mitigations have been published at the time of disclosure, and no known exploits are currently active in the wild. The root cause lies in improper input validation and unsafe type casting in the code handling extension blocks (bei.c at line 764).

Potential Impact

For European organizations, the primary impact is a Denial-of-Service condition that can disrupt critical communication systems relying on ION-DTN, particularly in aerospace, satellite communications, and research institutions involved in space networking. The vulnerability could cause receiver threads to crash, leading to loss of data transmission capability and degraded network reliability. This can affect mission-critical operations, data collection, and interplanetary communication experiments. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can have cascading effects on dependent systems and services. Given the specialized nature of ION-DTN, the affected organizations are likely niche but strategically important, including space agencies, research labs, and satellite operators. Disruptions could delay scientific missions or satellite operations, potentially causing financial and reputational damage. The lack of patches increases the urgency for implementing compensating controls.

Mitigation Recommendations

Since no official patches are available, European organizations should implement the following mitigations: 1) Deploy network-level filtering to block malformed BPv7 bundles or suspicious extension blocks, especially those containing unusually large byte strings or malformed CBOR arrays. 2) Employ strict input validation and anomaly detection on incoming DTN traffic to identify and discard malformed bundles before processing. 3) Isolate ION-DTN instances within segmented network zones with limited exposure to untrusted sources to reduce attack surface. 4) Monitor system logs and receiver thread health to detect early signs of exploitation attempts or crashes. 5) Engage with the vendor or NASA JPL for updates and potential patches, and consider contributing to or tracking open-source fixes. 6) If feasible, implement runtime memory allocation limits or sandboxing around the vulnerable code paths to prevent excessive memory requests. 7) Conduct regular security assessments and penetration testing focused on DTN implementations to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-03T22:21:59.614Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e56dd5a677756fc9a02cee

Added to database: 10/7/2025, 7:45:25 PM

Last enriched: 10/7/2025, 8:00:24 PM

Last updated: 10/9/2025, 3:56:30 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats