Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21899: CWE-125: Out-of-bounds Read in nasa CryptoLib

0
Medium
VulnerabilityCVE-2026-21899cvecve-2026-21899cwe-125
Published: Sat Jan 10 2026 (01/10/2026, 00:11:18 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, in base64urlDecode, padding-stripping dereferences input[inputLen - 1] before checking that inputLen > 0 or that input != NULL. For inputLen == 0, this becomes an OOB read at input[-1], potentially crashing the process. If input == NULL and inputLen == 0, it dereferences NULL - 1. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 01:05:29 UTC

Technical Analysis

CVE-2026-21899 is an out-of-bounds (OOB) read vulnerability classified as CWE-125 in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in the base64urlDecode function, where the code attempts to strip padding by dereferencing input[inputLen - 1] without first verifying that inputLen is greater than zero or that the input pointer is not NULL. If inputLen is zero, this results in an OOB read at input[-1], potentially causing a process crash or undefined behavior. If input is NULL and inputLen is zero, the code dereferences a NULL pointer offset by -1, which can lead to a segmentation fault or crash. The vulnerability affects all CryptoLib versions prior to 1.4.3 and has been patched in that release. The CVSS v3.1 score is 4.7 (medium), with an attack vector of network, low attack complexity, requiring high privileges, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The flaw could be leveraged to disrupt secure communications or cause denial of service in space communication systems relying on this library.

Potential Impact

For European organizations, particularly those involved in aerospace, satellite communications, and space research, this vulnerability could disrupt critical communication links between spacecraft and ground stations, potentially leading to loss of data confidentiality, integrity, and availability. Although the attack requires high privileges, exploitation could allow attackers to crash processes handling secure communications, causing denial of service and possibly enabling further attacks on the communication infrastructure. This could impact national space agencies, research institutions, and companies involved in satellite operations or space mission support. The disruption of secure data links could delay mission-critical operations or compromise sensitive telemetry data. Given the specialized nature of the affected software, the impact is likely limited to organizations using NASA’s CryptoLib or cFS-based systems, but these are often strategic assets with high operational importance.

Mitigation Recommendations

European organizations using CryptoLib should immediately upgrade to version 1.4.3 or later where the vulnerability is patched. In addition to patching, organizations should implement strict input validation and boundary checks on all inputs to base64urlDecode or similar functions to prevent malformed or zero-length inputs from triggering OOB reads. Conduct thorough code audits of any custom integrations with CryptoLib to ensure no unsafe assumptions about input length or null pointers exist. Employ runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing to detect similar issues early. Network segmentation and strict access controls should be enforced to limit exposure of systems running CryptoLib, especially since exploitation requires high privileges. Monitoring and logging of process crashes or unusual behavior in communication systems can help detect attempted exploitation. Finally, maintain close coordination with NASA and relevant space agencies for updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f5ed32c7f018d59bdb

Added to database: 1/10/2026, 12:48:53 AM

Last enriched: 1/10/2026, 1:05:29 AM

Last updated: 1/10/2026, 10:09:43 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats