CVE-2026-21900: CWE-125: Out-of-bounds Read in nasa CryptoLib
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.
AI Analysis
Technical Summary
CVE-2026-21900 is an out-of-bounds heap read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). CryptoLib secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in versions prior to 1.4.3 within the cryptography_encrypt() function, which processes JSON metadata received from Key Management Center (KMC) server responses. The root cause is a flawed iteration pattern using strtok that calculates the next token pointer as ptr + strlen(ptr) + 1, which can read one byte beyond the allocated buffer when handling short or malformed metadata strings. This out-of-bounds read can lead to memory disclosure or cause application instability, potentially enabling attackers to glean sensitive information or disrupt spacecraft communication security. The vulnerability is exploitable remotely over the network without requiring privileges or user interaction, increasing its risk profile. Although no public exploits are currently known, the high CVSS score (8.2) reflects the significant impact and ease of exploitation. The issue was patched in CryptoLib version 1.4.3 by correcting the parsing logic to prevent buffer overreads. Given CryptoLib’s specialized use in space communication systems, the threat primarily targets aerospace and space research organizations relying on this library for secure data link protocols.
Potential Impact
For European organizations, particularly those engaged in aerospace, satellite communications, and space research, this vulnerability poses a serious risk. Exploitation could lead to unauthorized disclosure of sensitive cryptographic metadata or cause denial of service conditions in critical communication links between spacecraft and ground stations. This could compromise mission integrity, data confidentiality, and operational availability of space assets. The impact extends to national space agencies, research institutions, and private aerospace companies using CryptoLib or derived systems. Disruption or data leakage in these contexts could have strategic and economic consequences, affecting satellite operations, scientific missions, and national security interests. Additionally, compromised communication security might expose European space infrastructure to espionage or sabotage attempts by hostile actors. The vulnerability’s network-exploitable nature means attackers can attempt exploitation remotely, increasing the urgency for mitigation in European aerospace sectors.
Mitigation Recommendations
European organizations should immediately upgrade to CryptoLib version 1.4.3 or later to remediate the vulnerability. Beyond patching, implement strict validation and sanitization of JSON metadata received from KMC servers to prevent malformed inputs from triggering parsing errors. Employ memory safety analysis tools and fuzz testing on cryptographic components to detect similar issues proactively. Network monitoring should be enhanced to detect anomalous traffic patterns or malformed metadata exchanges indicative of exploitation attempts. Organizations should also review and harden their supply chain and update management processes to ensure timely deployment of security patches in aerospace communication systems. Collaboration with NASA and other space agencies for threat intelligence sharing and coordinated response is advisable. Finally, consider implementing additional cryptographic protocol safeguards and redundancy in communication channels to mitigate potential disruptions.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands
CVE-2026-21900: CWE-125: Out-of-bounds Read in nasa CryptoLib
Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2026-21900 is an out-of-bounds heap read vulnerability classified under CWE-125 found in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). CryptoLib secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in versions prior to 1.4.3 within the cryptography_encrypt() function, which processes JSON metadata received from Key Management Center (KMC) server responses. The root cause is a flawed iteration pattern using strtok that calculates the next token pointer as ptr + strlen(ptr) + 1, which can read one byte beyond the allocated buffer when handling short or malformed metadata strings. This out-of-bounds read can lead to memory disclosure or cause application instability, potentially enabling attackers to glean sensitive information or disrupt spacecraft communication security. The vulnerability is exploitable remotely over the network without requiring privileges or user interaction, increasing its risk profile. Although no public exploits are currently known, the high CVSS score (8.2) reflects the significant impact and ease of exploitation. The issue was patched in CryptoLib version 1.4.3 by correcting the parsing logic to prevent buffer overreads. Given CryptoLib’s specialized use in space communication systems, the threat primarily targets aerospace and space research organizations relying on this library for secure data link protocols.
Potential Impact
For European organizations, particularly those engaged in aerospace, satellite communications, and space research, this vulnerability poses a serious risk. Exploitation could lead to unauthorized disclosure of sensitive cryptographic metadata or cause denial of service conditions in critical communication links between spacecraft and ground stations. This could compromise mission integrity, data confidentiality, and operational availability of space assets. The impact extends to national space agencies, research institutions, and private aerospace companies using CryptoLib or derived systems. Disruption or data leakage in these contexts could have strategic and economic consequences, affecting satellite operations, scientific missions, and national security interests. Additionally, compromised communication security might expose European space infrastructure to espionage or sabotage attempts by hostile actors. The vulnerability’s network-exploitable nature means attackers can attempt exploitation remotely, increasing the urgency for mitigation in European aerospace sectors.
Mitigation Recommendations
European organizations should immediately upgrade to CryptoLib version 1.4.3 or later to remediate the vulnerability. Beyond patching, implement strict validation and sanitization of JSON metadata received from KMC servers to prevent malformed inputs from triggering parsing errors. Employ memory safety analysis tools and fuzz testing on cryptographic components to detect similar issues proactively. Network monitoring should be enhanced to detect anomalous traffic patterns or malformed metadata exchanges indicative of exploitation attempts. Organizations should also review and harden their supply chain and update management processes to ensure timely deployment of security patches in aerospace communication systems. Collaboration with NASA and other space agencies for threat intelligence sharing and coordinated response is advisable. Finally, consider implementing additional cryptographic protocol safeguards and redundancy in communication channels to mitigate potential disruptions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T17:24:36.931Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6961a1f5ed32c7f018d59bdf
Added to database: 1/10/2026, 12:48:53 AM
Last enriched: 1/10/2026, 1:04:07 AM
Last updated: 1/10/2026, 9:31:23 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.