Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21898: CWE-125: Out-of-bounds Read in nasa CryptoLib

0
High
VulnerabilityCVE-2026-21898cvecve-2026-21898cwe-125
Published: Sat Jan 10 2026 (01/10/2026, 00:10:29 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_AOS_ProcessSecurity function reads memory without valid bounds checking when parsing AOS frame hashes. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 01:04:25 UTC

Technical Analysis

CVE-2026-21898 is an out-of-bounds read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This protocol secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the Crypto_AOS_ProcessSecurity function, which processes AOS (Advanced Orbiting Systems) frame hashes. Prior to version 1.4.3, this function reads memory without performing proper bounds checking, potentially accessing memory beyond the allocated buffer. Such out-of-bounds reads can cause application crashes (denial of service) or leak sensitive memory contents, which may include cryptographic material or other critical data. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the high CVSS score of 8.2 reflects the potential impact on availability and confidentiality. The issue was patched in CryptoLib version 1.4.3 by adding proper bounds validation during hash parsing. Given CryptoLib's specialized use in space communication systems, the affected installations are likely limited but critical. The vulnerability highlights the importance of rigorous input validation in cryptographic protocol implementations, especially in aerospace contexts where system reliability and security are paramount.

Potential Impact

For European organizations, the impact of CVE-2026-21898 is significant primarily in aerospace, satellite communications, and space research sectors that utilize NASA's CryptoLib or derivative implementations of the CCSDS SDLS-EP protocol. Exploitation could lead to denial of service conditions, disrupting critical spacecraft-to-ground communication links, potentially affecting mission operations and data integrity. Additionally, out-of-bounds reads might expose sensitive cryptographic material or operational data, undermining confidentiality and trust in secure communication channels. Such disruptions could delay scientific missions, compromise satellite command and control, or expose sensitive information to adversaries. Given the strategic importance of space infrastructure and the increasing reliance on secure satellite communications in Europe, this vulnerability poses a risk to national security, commercial satellite operators, and research institutions. Although no active exploits are known, the ease of remote exploitation without authentication elevates the threat level. Organizations failing to patch may face operational outages or data leaks, with cascading effects on dependent systems and services.

Mitigation Recommendations

To mitigate CVE-2026-21898, European organizations should immediately upgrade to CryptoLib version 1.4.3 or later, where the out-of-bounds read issue has been fixed. In addition to patching, organizations should conduct thorough code reviews and testing of any custom or derivative implementations of the CCSDS SDLS-EP protocol to ensure proper bounds checking and input validation. Network-level protections such as strict filtering and anomaly detection on spacecraft communication links can help detect and block malformed frames attempting exploitation. Implementing runtime memory protection techniques (e.g., AddressSanitizer or similar tools) during development and testing phases can help identify similar vulnerabilities early. Organizations should also establish incident response plans specific to spacecraft communication disruptions and monitor for unusual behavior indicative of exploitation attempts. Collaboration with space agencies and vendors to share threat intelligence and coordinate patch deployment is critical. Finally, ensuring cryptographic keys and sensitive data are stored and handled securely reduces the risk of data exposure even if memory is read out-of-bounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f5ed32c7f018d59bd7

Added to database: 1/10/2026, 12:48:53 AM

Last enriched: 1/10/2026, 1:04:25 AM

Last updated: 1/10/2026, 10:09:42 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats