Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21900: CWE-125: Out-of-bounds Read in nasa CryptoLib

0
High
VulnerabilityCVE-2026-21900cvecve-2026-21900cwe-125
Published: Sat Jan 10 2026 (01/10/2026, 00:14:33 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 01:04:07 UTC

Technical Analysis

CVE-2026-21900 is an out-of-bounds heap read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). CryptoLib secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in versions prior to 1.4.3 within the cryptography_encrypt() function, which processes JSON metadata received from Key Management Center (KMC) server responses. The root cause is a flawed iteration pattern using strtok that calculates the next token pointer as ptr + strlen(ptr) + 1, which can read one byte beyond the allocated buffer when handling short or malformed metadata strings. This out-of-bounds read can lead to memory disclosure or cause application instability, potentially enabling attackers to glean sensitive information or disrupt spacecraft communication security. The vulnerability is exploitable remotely over the network without requiring privileges or user interaction, increasing its risk profile. Although no public exploits are currently known, the high CVSS score (8.2) reflects the significant impact and ease of exploitation. The issue was patched in CryptoLib version 1.4.3 by correcting the parsing logic to prevent buffer overreads. Given CryptoLib’s specialized use in space communication systems, the threat primarily targets aerospace and space research organizations relying on this library for secure data link protocols.

Potential Impact

For European organizations, particularly those engaged in aerospace, satellite communications, and space research, this vulnerability poses a serious risk. Exploitation could lead to unauthorized disclosure of sensitive cryptographic metadata or cause denial of service conditions in critical communication links between spacecraft and ground stations. This could compromise mission integrity, data confidentiality, and operational availability of space assets. The impact extends to national space agencies, research institutions, and private aerospace companies using CryptoLib or derived systems. Disruption or data leakage in these contexts could have strategic and economic consequences, affecting satellite operations, scientific missions, and national security interests. Additionally, compromised communication security might expose European space infrastructure to espionage or sabotage attempts by hostile actors. The vulnerability’s network-exploitable nature means attackers can attempt exploitation remotely, increasing the urgency for mitigation in European aerospace sectors.

Mitigation Recommendations

European organizations should immediately upgrade to CryptoLib version 1.4.3 or later to remediate the vulnerability. Beyond patching, implement strict validation and sanitization of JSON metadata received from KMC servers to prevent malformed inputs from triggering parsing errors. Employ memory safety analysis tools and fuzz testing on cryptographic components to detect similar issues proactively. Network monitoring should be enhanced to detect anomalous traffic patterns or malformed metadata exchanges indicative of exploitation attempts. Organizations should also review and harden their supply chain and update management processes to ensure timely deployment of security patches in aerospace communication systems. Collaboration with NASA and other space agencies for threat intelligence sharing and coordinated response is advisable. Finally, consider implementing additional cryptographic protocol safeguards and redundancy in communication channels to mitigate potential disruptions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.931Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961a1f5ed32c7f018d59bdf

Added to database: 1/10/2026, 12:48:53 AM

Last enriched: 1/10/2026, 1:04:07 AM

Last updated: 1/10/2026, 9:31:23 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats