CVE-2025-70085: n/a
An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.
AI Analysis
Technical Summary
CVE-2025-70085 is a stack-based buffer overflow vulnerability identified in OpenSatKit version 2.2.1. The root cause lies in the EventErrStr buffer, which is statically allocated at 256 bytes. The vulnerable code uses the unsafe sprintf function to concatenate two filenames—Source1Filename and the string returned by FileUtil_FileStateStr—into this buffer without any bounds checking or use of safer formatting specifiers like %.*s. Since filenames can be as long as OS_MAX_PATH_LEN (commonly between 64 and 256 bytes), the combined formatted string plus constant text can exceed the 256-byte buffer size, causing a stack overflow. This unsafe pattern is present in multiple functions within file.c, such as FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length before writing. The overflow can overwrite the stack, potentially allowing an attacker to execute arbitrary code, crash the application, or cause denial of service. The vulnerability requires no privileges or user interaction to exploit and affects the confidentiality, integrity, and availability of affected systems. The CVSS v3.1 base score is 9.8, reflecting its critical severity. No public exploits are currently known, but the vulnerability represents a significant risk to systems running OpenSatKit 2.2.1, especially in environments where long filenames are used or attacker-controlled input can influence these filenames.
Potential Impact
The impact of CVE-2025-70085 is severe due to its potential to allow remote, unauthenticated attackers to execute arbitrary code or cause denial of service via a stack buffer overflow. Successful exploitation can lead to full compromise of affected systems, including unauthorized access to sensitive data (confidentiality breach), modification or destruction of data (integrity loss), and disruption of system operations (availability loss). Organizations relying on OpenSatKit 2.2.1, particularly in aerospace, satellite communications, and defense sectors, face heightened risk as these systems often handle critical mission data and control satellite operations. The vulnerability could be leveraged to disrupt satellite command and control software, potentially causing cascading failures or loss of control over satellite assets. Additionally, the lack of authentication or user interaction requirements increases the attack surface, making automated exploitation feasible. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit given the unsafe coding practices involved.
Mitigation Recommendations
To mitigate CVE-2025-70085, organizations should immediately upgrade OpenSatKit to a version where this vulnerability is patched once available. In the absence of an official patch, developers should audit and refactor the affected code in file.c, replacing all unsafe sprintf calls with bounded functions such as snprintf or using format specifiers that limit output length (e.g., %.*s). Implement rigorous input validation to ensure filenames do not exceed safe lengths before processing. Employ compiler-based protections such as stack canaries, Address Space Layout Randomization (ASLR), and Data Execution Prevention (DEP) to reduce exploitation risk. Additionally, conduct thorough code reviews and static analysis to identify similar unsafe string operations elsewhere in the codebase. Network-level protections, such as firewall rules and intrusion detection systems, should monitor for anomalous activity targeting OpenSatKit services. Finally, maintain robust incident response plans to quickly address any exploitation attempts.
Affected Countries
United States, France, Germany, United Kingdom, Japan, Canada, Australia, India, South Korea, Israel, Russia
CVE-2025-70085: n/a
Description
An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-70085 is a stack-based buffer overflow vulnerability identified in OpenSatKit version 2.2.1. The root cause lies in the EventErrStr buffer, which is statically allocated at 256 bytes. The vulnerable code uses the unsafe sprintf function to concatenate two filenames—Source1Filename and the string returned by FileUtil_FileStateStr—into this buffer without any bounds checking or use of safer formatting specifiers like %.*s. Since filenames can be as long as OS_MAX_PATH_LEN (commonly between 64 and 256 bytes), the combined formatted string plus constant text can exceed the 256-byte buffer size, causing a stack overflow. This unsafe pattern is present in multiple functions within file.c, such as FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length before writing. The overflow can overwrite the stack, potentially allowing an attacker to execute arbitrary code, crash the application, or cause denial of service. The vulnerability requires no privileges or user interaction to exploit and affects the confidentiality, integrity, and availability of affected systems. The CVSS v3.1 base score is 9.8, reflecting its critical severity. No public exploits are currently known, but the vulnerability represents a significant risk to systems running OpenSatKit 2.2.1, especially in environments where long filenames are used or attacker-controlled input can influence these filenames.
Potential Impact
The impact of CVE-2025-70085 is severe due to its potential to allow remote, unauthenticated attackers to execute arbitrary code or cause denial of service via a stack buffer overflow. Successful exploitation can lead to full compromise of affected systems, including unauthorized access to sensitive data (confidentiality breach), modification or destruction of data (integrity loss), and disruption of system operations (availability loss). Organizations relying on OpenSatKit 2.2.1, particularly in aerospace, satellite communications, and defense sectors, face heightened risk as these systems often handle critical mission data and control satellite operations. The vulnerability could be leveraged to disrupt satellite command and control software, potentially causing cascading failures or loss of control over satellite assets. Additionally, the lack of authentication or user interaction requirements increases the attack surface, making automated exploitation feasible. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit given the unsafe coding practices involved.
Mitigation Recommendations
To mitigate CVE-2025-70085, organizations should immediately upgrade OpenSatKit to a version where this vulnerability is patched once available. In the absence of an official patch, developers should audit and refactor the affected code in file.c, replacing all unsafe sprintf calls with bounded functions such as snprintf or using format specifiers that limit output length (e.g., %.*s). Implement rigorous input validation to ensure filenames do not exceed safe lengths before processing. Employ compiler-based protections such as stack canaries, Address Space Layout Randomization (ASLR), and Data Execution Prevention (DEP) to reduce exploitation risk. Additionally, conduct thorough code reviews and static analysis to identify similar unsafe string operations elsewhere in the codebase. Network-level protections, such as firewall rules and intrusion detection systems, should monitor for anomalous activity targeting OpenSatKit services. Finally, maintain robust incident response plans to quickly address any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698cc7724b57a58fa1b0b315
Added to database: 2/11/2026, 6:16:18 PM
Last enriched: 2/19/2026, 2:10:28 PM
Last updated: 3/29/2026, 1:45:43 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.