Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21898: CWE-125: Out-of-bounds Read in nasa CryptoLib

0
High
VulnerabilityCVE-2026-21898cvecve-2026-21898cwe-125
Published: Sat Jan 10 2026 (01/10/2026, 00:10:29 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_AOS_ProcessSecurity function reads memory without valid bounds checking when parsing AOS frame hashes. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:48:36 UTC

Technical Analysis

CVE-2026-21898 is an out-of-bounds read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This protocol secures communication between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the Crypto_AOS_ProcessSecurity function, which processes AOS (Advanced Orbiting Systems) frame hashes. Prior to version 1.4.3, this function reads memory without proper bounds checking, potentially accessing memory beyond allocated buffers. Such out-of-bounds reads can cause application crashes leading to denial of service (availability impact) or may leak sensitive information from adjacent memory areas (confidentiality impact). The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no exploits are currently known in the wild, the flaw poses a significant threat to systems relying on CryptoLib for secure spacecraft communication. The issue was addressed by NASA in version 1.4.3 by implementing proper bounds checking during hash parsing. This vulnerability highlights the criticality of rigorous input validation in security protocol implementations, especially in aerospace contexts where communication integrity and availability are paramount.

Potential Impact

For European organizations, particularly those involved in aerospace, satellite communications, or space research collaborating with NASA or using CCSDS protocols, this vulnerability could disrupt secure communication channels between spacecraft and ground stations. A successful exploitation could cause denial of service by crashing the CryptoLib component, potentially interrupting mission-critical data flows. Additionally, there is a risk of sensitive data leakage from memory, which could compromise confidentiality of mission data or cryptographic material. Given the specialized nature of the software, the impact is mostly confined to aerospace and space agencies, but any European entity relying on these protocols or software stacks could face operational disruptions and data exposure. The availability impact could delay mission operations or ground control responses, while confidentiality breaches could undermine trust and security of space communication infrastructure.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of NASA's CryptoLib to version 1.4.3 or later, where the out-of-bounds read issue has been patched. Organizations should conduct an inventory of systems using CryptoLib, especially those handling spacecraft communication, to identify vulnerable versions. Implement rigorous input validation and memory safety checks in any custom or derivative implementations of the SDLS-EP protocol. Employ runtime protections such as memory-safe languages or bounds-checking tools where feasible. Monitor network traffic for anomalous AOS frame hashes that could indicate exploitation attempts. Coordinate with NASA and aerospace partners to ensure timely patch deployment and share threat intelligence. Finally, conduct regular security assessments and fuzz testing on protocol parsers to detect similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f5ed32c7f018d59bd7

Added to database: 1/10/2026, 12:48:53 AM

Last enriched: 1/17/2026, 7:48:36 AM

Last updated: 2/4/2026, 6:01:40 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats