Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21899: CWE-125: Out-of-bounds Read in nasa CryptoLib

0
Medium
VulnerabilityCVE-2026-21899cvecve-2026-21899cwe-125
Published: Sat Jan 10 2026 (01/10/2026, 00:11:18 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, in base64urlDecode, padding-stripping dereferences input[inputLen - 1] before checking that inputLen > 0 or that input != NULL. For inputLen == 0, this becomes an OOB read at input[-1], potentially crashing the process. If input == NULL and inputLen == 0, it dereferences NULL - 1. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:48:47 UTC

Technical Analysis

CVE-2026-21899 is an out-of-bounds (OOB) read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library is used to secure communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in the base64urlDecode function where the code attempts to strip padding by dereferencing input[inputLen - 1] before verifying that inputLen is greater than zero and that the input pointer is not NULL. If inputLen is zero, this results in an OOB read at input[-1], potentially causing a crash or undefined behavior. Worse, if input is NULL and inputLen is zero, the code dereferences a NULL pointer offset by -1, leading to a null pointer dereference. These conditions can cause denial of service through process crashes and may expose memory contents, impacting confidentiality and integrity. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and high privileges (PR:H), with no user interaction (UI:N). The scope is unchanged (S:U), and the CVSS v3.1 base score is 4.7, indicating medium severity. The issue was patched in CryptoLib version 1.4.3. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, especially those involved in aerospace, satellite communications, or space research, this vulnerability could disrupt secure communications between spacecraft and ground stations, potentially leading to denial of service or leakage of sensitive mission data. The out-of-bounds read could cause system crashes, impacting availability of critical communication links. Confidentiality and integrity risks arise if memory contents are exposed or corrupted. Given the specialized use of CryptoLib in space systems, the impact is significant for entities relying on this software for mission-critical operations. Disruptions could affect satellite control, data acquisition, and command execution, with downstream effects on scientific research, telecommunications, and defense. Although exploitation requires high privileges, insider threats or compromised ground station systems could leverage this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of NASA's CryptoLib to version 1.4.3 or later, where the vulnerability has been patched. Organizations should audit their software supply chain and embedded systems to identify CryptoLib usage, including indirect dependencies within aerospace and satellite communication software stacks. Implement rigorous input validation and boundary checks in any custom code interfacing with CryptoLib functions to prevent malformed inputs. Employ runtime protections such as memory safety tools and address sanitizers during development and testing to detect similar issues. Restrict access to ground station systems and spacecraft communication interfaces to trusted, authenticated personnel to reduce the risk of exploitation requiring high privileges. Monitor system logs for crashes or anomalies that could indicate attempted exploitation. Establish incident response plans tailored to aerospace communication disruptions. Finally, collaborate with vendors and space agencies to stay informed on updates and advisories related to CryptoLib and related protocols.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f5ed32c7f018d59bdb

Added to database: 1/10/2026, 12:48:53 AM

Last enriched: 1/17/2026, 7:48:47 AM

Last updated: 2/4/2026, 6:01:49 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats