Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64096: CWE-121: Stack-based Buffer Overflow in nasa CryptoLib

0
High
VulnerabilityCVE-2025-64096cvecve-2025-64096cwe-121
Published: Thu Oct 30 2025 (10/30/2025, 17:09:24 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to 1.4.2, there is a missing bounds check in Crypto_Key_update() (crypto_key_mgmt.c) which allows a remote attacker to trigger a stack-based buffer overflow by supplying a TLV packet with a spoofed length field. The function calculates the number of keys from an attacker-controlled field (pdu_len), which may exceed the static array size (kblk[98]), leading to an out-of-bounds write and potential memory corruption. This vulnerability is fixed in 1.4.2.

AI-Powered Analysis

AILast updated: 01/09/2026, 23:40:20 UTC

Technical Analysis

CVE-2025-64096 is a stack-based buffer overflow vulnerability identified in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communication between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the Crypto_Key_update() function within crypto_key_mgmt.c, where the function processes TLV (Type-Length-Value) packets containing a length field (pdu_len) that is attacker-controlled. Prior to version 1.4.2, the code does not properly validate this length against the size of a static array (kblk[98]). If an attacker supplies a spoofed TLV packet with an excessive length, the function calculates a number of keys that exceeds the array bounds, causing a stack buffer overflow. This overflow can corrupt adjacent memory on the stack, potentially allowing an attacker to execute arbitrary code, crash the system, or manipulate sensitive data. The vulnerability requires only low privileges (PR:L) and no user interaction (UI:N), and can be exploited remotely over the network (AV:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS v3.0 score of 8.8 reflects high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability is critical given the sensitive nature of space communication systems. The issue was addressed in CryptoLib version 1.4.2 by adding proper bounds checking to prevent out-of-bounds writes.

Potential Impact

The impact of CVE-2025-64096 on European organizations is significant, especially for those involved in aerospace, satellite communications, and space research. The vulnerability compromises the security of communications between spacecraft and ground stations, potentially allowing attackers to intercept, alter, or disrupt critical data transmissions. This could lead to loss of mission data, unauthorized command injection, or denial of service affecting spacecraft operations. European space agencies such as ESA and companies providing satellite services or ground station infrastructure could face operational disruptions and data breaches. The confidentiality of sensitive telemetry and command data is at risk, as is the integrity and availability of space communication links. Given the critical role of space assets in telecommunications, navigation, and defense, exploitation could have cascading effects on national security and commercial services. The remote exploitability and lack of required user interaction increase the threat level. Although no known exploits exist yet, the vulnerability's presence in widely used space communication software demands urgent attention to prevent potential future attacks.

Mitigation Recommendations

To mitigate CVE-2025-64096, affected organizations must upgrade CryptoLib to version 1.4.2 or later, which includes the necessary bounds checking to prevent buffer overflows. Where immediate upgrade is not feasible, organizations should implement strict network segmentation to isolate spacecraft communication systems from untrusted networks, reducing exposure to remote attacks. Deploy deep packet inspection and anomaly detection systems to monitor for malformed TLV packets with suspicious length fields indicative of exploitation attempts. Employ rigorous input validation at all protocol layers to reject packets with invalid or out-of-range length values. Conduct regular security audits and code reviews of custom or integrated cryptographic libraries to detect similar vulnerabilities. Additionally, implement runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) in the software environment to mitigate exploitation impact. Establish incident response plans specific to space communication systems to quickly address potential compromises. Collaboration with NASA and other space agencies for threat intelligence sharing is recommended to stay informed of emerging exploits or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-27T15:26:14.126Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6903adccaebfcd54748fc906

Added to database: 10/30/2025, 6:26:20 PM

Last enriched: 1/9/2026, 11:40:20 PM

Last updated: 2/5/2026, 9:00:11 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats