CVE-2026-21897: CWE-787: Out-of-bounds Write in nasa CryptoLib
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_Config_Add_Gvcid_Managed_Parameters function only checks whether gvcid_counter > GVCID_MAN_PARAM_SIZE. As a result, it allows up to the 251st entry, which causes a write past the end of the array, overwriting gvcid_counter located immediately after gvcid_managed_parameters_array[250]. This leads to an out-of-bounds write, and the overwritten gvcid_counter may become an arbitrary value, potentially affecting the parameter lookup/registration logic that relies on it. This issue has been patched in version 1.4.3.
AI Analysis
Technical Summary
CVE-2026-21897 is an out-of-bounds write vulnerability classified under CWE-787 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability arises in the Crypto_Config_Add_Gvcid_Managed_Parameters function, which manages an array of GVCID (Global Virtual Channel Identifier) managed parameters. The function only checks if gvcid_counter is greater than GVCID_MAN_PARAM_SIZE before allowing an addition, permitting up to the 251st entry in an array sized for 250 entries (index 0 to 249). This off-by-one error leads to a write beyond the array boundary, overwriting the gvcid_counter variable located immediately after the array. Corruption of gvcid_counter can cause it to hold arbitrary values, potentially disrupting the parameter lookup and registration logic that depends on it. Such corruption can lead to unpredictable behavior, including denial of service or incorrect cryptographic operations, affecting confidentiality, integrity, and availability of communications. The vulnerability is remotely exploitable without requiring privileges or user interaction, increasing its risk. The issue was patched in CryptoLib version 1.4.3 by correcting the boundary check to prevent out-of-bounds writes. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 score is 7.3 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations, especially those involved in aerospace, satellite communications, and space research, this vulnerability poses a significant risk. Compromise of the CryptoLib could lead to unauthorized manipulation or disruption of spacecraft-to-ground communications, potentially causing mission failures, data corruption, or loss of sensitive telemetry and command data. The integrity and availability of critical space communication links could be undermined, affecting satellite operations and related infrastructure. Given the reliance on secure communication protocols in space missions, exploitation could also have cascading effects on dependent systems and services. Although no active exploits are known, the vulnerability's remote exploitability and high severity necessitate prompt attention. Organizations operating or collaborating with space agencies or contractors using the affected CryptoLib versions must consider the risk to their operational continuity and data security.
Mitigation Recommendations
The primary mitigation is to upgrade CryptoLib to version 1.4.3 or later, where the boundary check flaw has been corrected. Organizations should audit their software supply chain and embedded systems to identify any use of vulnerable CryptoLib versions. Implement rigorous input validation and boundary checking in custom or dependent code handling GVCID parameters. Conduct thorough testing of cryptographic modules for similar out-of-bounds vulnerabilities. Employ runtime protections such as memory safety tools or address sanitizers during development and testing phases. For deployed systems where immediate upgrade is not feasible, consider isolating affected components from network exposure and monitoring for anomalous behavior indicative of exploitation attempts. Engage with vendors and partners to ensure timely patch deployment and share threat intelligence related to this vulnerability. Finally, incorporate this vulnerability into risk assessments and incident response plans specific to aerospace and satellite communication environments.
Affected Countries
France, Germany, Italy, United Kingdom, Spain, Netherlands
CVE-2026-21897: CWE-787: Out-of-bounds Write in nasa CryptoLib
Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_Config_Add_Gvcid_Managed_Parameters function only checks whether gvcid_counter > GVCID_MAN_PARAM_SIZE. As a result, it allows up to the 251st entry, which causes a write past the end of the array, overwriting gvcid_counter located immediately after gvcid_managed_parameters_array[250]. This leads to an out-of-bounds write, and the overwritten gvcid_counter may become an arbitrary value, potentially affecting the parameter lookup/registration logic that relies on it. This issue has been patched in version 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2026-21897 is an out-of-bounds write vulnerability classified under CWE-787 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability arises in the Crypto_Config_Add_Gvcid_Managed_Parameters function, which manages an array of GVCID (Global Virtual Channel Identifier) managed parameters. The function only checks if gvcid_counter is greater than GVCID_MAN_PARAM_SIZE before allowing an addition, permitting up to the 251st entry in an array sized for 250 entries (index 0 to 249). This off-by-one error leads to a write beyond the array boundary, overwriting the gvcid_counter variable located immediately after the array. Corruption of gvcid_counter can cause it to hold arbitrary values, potentially disrupting the parameter lookup and registration logic that depends on it. Such corruption can lead to unpredictable behavior, including denial of service or incorrect cryptographic operations, affecting confidentiality, integrity, and availability of communications. The vulnerability is remotely exploitable without requiring privileges or user interaction, increasing its risk. The issue was patched in CryptoLib version 1.4.3 by correcting the boundary check to prevent out-of-bounds writes. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 score is 7.3 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations, especially those involved in aerospace, satellite communications, and space research, this vulnerability poses a significant risk. Compromise of the CryptoLib could lead to unauthorized manipulation or disruption of spacecraft-to-ground communications, potentially causing mission failures, data corruption, or loss of sensitive telemetry and command data. The integrity and availability of critical space communication links could be undermined, affecting satellite operations and related infrastructure. Given the reliance on secure communication protocols in space missions, exploitation could also have cascading effects on dependent systems and services. Although no active exploits are known, the vulnerability's remote exploitability and high severity necessitate prompt attention. Organizations operating or collaborating with space agencies or contractors using the affected CryptoLib versions must consider the risk to their operational continuity and data security.
Mitigation Recommendations
The primary mitigation is to upgrade CryptoLib to version 1.4.3 or later, where the boundary check flaw has been corrected. Organizations should audit their software supply chain and embedded systems to identify any use of vulnerable CryptoLib versions. Implement rigorous input validation and boundary checking in custom or dependent code handling GVCID parameters. Conduct thorough testing of cryptographic modules for similar out-of-bounds vulnerabilities. Employ runtime protections such as memory safety tools or address sanitizers during development and testing phases. For deployed systems where immediate upgrade is not feasible, consider isolating affected components from network exposure and monitoring for anomalous behavior indicative of exploitation attempts. Engage with vendors and partners to ensure timely patch deployment and share threat intelligence related to this vulnerability. Finally, incorporate this vulnerability into risk assessments and incident response plans specific to aerospace and satellite communication environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T17:24:36.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961a1f5ed32c7f018d59bd3
Added to database: 1/10/2026, 12:48:53 AM
Last enriched: 1/17/2026, 7:48:26 AM
Last updated: 2/7/2026, 9:56:22 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.