CVE-2026-22024: CWE-401: Missing Release of Memory after Effective Lifetime in nasa CryptoLib
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.
AI Analysis
Technical Summary
CVE-2026-22024 is a memory leak vulnerability classified under CWE-401 affecting NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the cryptography_encrypt() function, which allocates multiple buffers for handling HTTP requests and JSON parsing but fails to release these buffers on any execution path. Each invocation leaks roughly 400 bytes of memory. While the leak per call is relatively small, continuous or high-frequency calls can cumulatively exhaust system memory, leading to degraded performance or denial of service due to resource exhaustion. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. The issue was identified and patched in CryptoLib version 1.4.3. No known exploits are currently reported in the wild. The vulnerability's CVSS 4.0 score is 6.3, reflecting its medium severity, with network attack vector, low complexity, no privileges required, and no user interaction needed. The scope is limited to systems using affected CryptoLib versions, typically in aerospace and space communication environments.
Potential Impact
For European organizations, particularly those engaged in aerospace, satellite communications, space research, or defense sectors utilizing NASA's CryptoLib, this vulnerability could lead to gradual memory exhaustion on critical communication systems. This may cause system slowdowns, crashes, or denial of service, potentially disrupting spacecraft-to-ground communication links. Such disruptions could impact mission-critical operations, data integrity, and availability of space communication channels. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on space communication systems could have significant operational and strategic consequences. Organizations relying on this library must consider the risk of degraded system performance and potential mission interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in high-traffic or long-duration communication scenarios.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of NASA's CryptoLib to version 1.4.3 or later, where the memory leak has been addressed. Organizations should implement rigorous memory usage monitoring on systems running affected versions to detect abnormal memory consumption patterns indicative of leaks. Employing automated alerts for memory thresholds can enable proactive response before exhaustion occurs. Additionally, limiting the frequency and volume of cryptography_encrypt() calls where feasible can reduce leak impact until patches are applied. Conduct thorough testing of patched versions in operational environments to ensure stability. For systems where immediate patching is not possible, consider isolating or segmenting affected components to minimize impact on critical infrastructure. Finally, maintain close coordination with NASA and relevant aerospace cybersecurity advisories for updates or further recommendations.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2026-22024: CWE-401: Missing Release of Memory after Effective Lifetime in nasa CryptoLib
Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2026-22024 is a memory leak vulnerability classified under CWE-401 affecting NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the cryptography_encrypt() function, which allocates multiple buffers for handling HTTP requests and JSON parsing but fails to release these buffers on any execution path. Each invocation leaks roughly 400 bytes of memory. While the leak per call is relatively small, continuous or high-frequency calls can cumulatively exhaust system memory, leading to degraded performance or denial of service due to resource exhaustion. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. The issue was identified and patched in CryptoLib version 1.4.3. No known exploits are currently reported in the wild. The vulnerability's CVSS 4.0 score is 6.3, reflecting its medium severity, with network attack vector, low complexity, no privileges required, and no user interaction needed. The scope is limited to systems using affected CryptoLib versions, typically in aerospace and space communication environments.
Potential Impact
For European organizations, particularly those engaged in aerospace, satellite communications, space research, or defense sectors utilizing NASA's CryptoLib, this vulnerability could lead to gradual memory exhaustion on critical communication systems. This may cause system slowdowns, crashes, or denial of service, potentially disrupting spacecraft-to-ground communication links. Such disruptions could impact mission-critical operations, data integrity, and availability of space communication channels. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on space communication systems could have significant operational and strategic consequences. Organizations relying on this library must consider the risk of degraded system performance and potential mission interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in high-traffic or long-duration communication scenarios.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of NASA's CryptoLib to version 1.4.3 or later, where the memory leak has been addressed. Organizations should implement rigorous memory usage monitoring on systems running affected versions to detect abnormal memory consumption patterns indicative of leaks. Employing automated alerts for memory thresholds can enable proactive response before exhaustion occurs. Additionally, limiting the frequency and volume of cryptography_encrypt() calls where feasible can reduce leak impact until patches are applied. Conduct thorough testing of patched versions in operational environments to ensure stability. For systems where immediate patching is not possible, consider isolating or segmenting affected components to minimize impact on critical infrastructure. Finally, maintain close coordination with NASA and relevant aerospace cybersecurity advisories for updates or further recommendations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T22:30:38.718Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6961a1f6ed32c7f018d59be9
Added to database: 1/10/2026, 12:48:54 AM
Last enriched: 1/17/2026, 7:43:02 AM
Last updated: 2/7/2026, 7:24:43 PM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.