Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22024: CWE-401: Missing Release of Memory after Effective Lifetime in nasa CryptoLib

0
Medium
VulnerabilityCVE-2026-22024cvecve-2026-22024cwe-401
Published: Sat Jan 10 2026 (01/10/2026, 00:19:16 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:43:02 UTC

Technical Analysis

CVE-2026-22024 is a memory leak vulnerability classified under CWE-401 affecting NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the cryptography_encrypt() function, which allocates multiple buffers for handling HTTP requests and JSON parsing but fails to release these buffers on any execution path. Each invocation leaks roughly 400 bytes of memory. While the leak per call is relatively small, continuous or high-frequency calls can cumulatively exhaust system memory, leading to degraded performance or denial of service due to resource exhaustion. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. The issue was identified and patched in CryptoLib version 1.4.3. No known exploits are currently reported in the wild. The vulnerability's CVSS 4.0 score is 6.3, reflecting its medium severity, with network attack vector, low complexity, no privileges required, and no user interaction needed. The scope is limited to systems using affected CryptoLib versions, typically in aerospace and space communication environments.

Potential Impact

For European organizations, particularly those engaged in aerospace, satellite communications, space research, or defense sectors utilizing NASA's CryptoLib, this vulnerability could lead to gradual memory exhaustion on critical communication systems. This may cause system slowdowns, crashes, or denial of service, potentially disrupting spacecraft-to-ground communication links. Such disruptions could impact mission-critical operations, data integrity, and availability of space communication channels. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on space communication systems could have significant operational and strategic consequences. Organizations relying on this library must consider the risk of degraded system performance and potential mission interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in high-traffic or long-duration communication scenarios.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of NASA's CryptoLib to version 1.4.3 or later, where the memory leak has been addressed. Organizations should implement rigorous memory usage monitoring on systems running affected versions to detect abnormal memory consumption patterns indicative of leaks. Employing automated alerts for memory thresholds can enable proactive response before exhaustion occurs. Additionally, limiting the frequency and volume of cryptography_encrypt() calls where feasible can reduce leak impact until patches are applied. Conduct thorough testing of patched versions in operational environments to ensure stability. For systems where immediate patching is not possible, consider isolating or segmenting affected components to minimize impact on critical infrastructure. Finally, maintain close coordination with NASA and relevant aerospace cybersecurity advisories for updates or further recommendations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.718Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961a1f6ed32c7f018d59be9

Added to database: 1/10/2026, 12:48:54 AM

Last enriched: 1/17/2026, 7:43:02 AM

Last updated: 2/7/2026, 4:38:07 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats