CVE-2026-22025: CWE-401: Missing Release of Memory after Effective Lifetime in nasa CryptoLib
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.
AI Analysis
Technical Summary
CVE-2026-22025 is a vulnerability identified in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP), which secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability arises in versions prior to 1.4.3 when the Key Management Center (KMC) server responds with a non-200 HTTP status code. Under these conditions, the cryptography_encrypt() and cryptography_decrypt() functions return immediately without releasing previously allocated memory buffers, resulting in a memory leak of approximately 467 bytes per failed request. This leak accumulates with repeated failures, which can be triggered either by maliciously crafted server responses or network issues causing repeated errors. Over time, this memory exhaustion can degrade system performance or cause application crashes, impacting the availability of critical cryptographic operations in spacecraft communication systems. The vulnerability does not affect confidentiality or integrity directly, as it does not expose sensitive data or allow unauthorized data modification. Exploitation requires no authentication or user interaction, making it remotely exploitable over the network. The issue has been addressed in CryptoLib version 1.4.3, which properly frees memory buffers even when errors occur. No known exploits are currently reported in the wild. The CVSS v4.0 score of 6.3 reflects a medium severity, considering the network attack vector, lack of required privileges, and the impact limited to availability degradation. The vulnerability is classified under CWE-401 (Missing Release of Memory after Effective Lifetime) and CWE-770 (Allocation of Resources Without Limits or Throttling).
Potential Impact
For European organizations, the primary impact of CVE-2026-22025 is on the availability and reliability of systems using NASA's CryptoLib for securing spacecraft communications. This is particularly relevant for aerospace companies, satellite operators, and research institutions involved in space missions or satellite ground station operations. Memory exhaustion caused by repeated failed cryptographic operations can lead to system slowdowns, crashes, or denial of service, potentially disrupting critical communication links between spacecraft and ground control. While the vulnerability does not compromise confidentiality or integrity, the loss of availability in space communication systems can have severe operational consequences, including loss of telemetry data, command execution failures, and mission delays. European space agencies and contractors relying on CryptoLib or derivative implementations may face increased risk if they have not applied the patch. Additionally, organizations operating satellite ground stations or involved in space data processing could experience service interruptions. The vulnerability's exploitation does not require authentication, increasing the risk from external network-based attackers or misconfigured servers. However, the absence of known exploits in the wild suggests limited immediate threat but underscores the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2026-22025, European organizations should immediately upgrade to CryptoLib version 1.4.3 or later, where the memory leak issue has been resolved. In environments where immediate upgrade is not feasible, implement monitoring of memory usage in systems running CryptoLib to detect abnormal memory growth indicative of exploitation or network-induced failures. Network-level controls should be employed to ensure the integrity and reliability of the KMC server responses, including validating HTTP status codes and implementing retry logic with backoff to reduce repeated failed requests. Additionally, organizations should audit their cryptographic communication workflows to identify and remediate any misconfigurations that could cause frequent non-200 HTTP responses. Implementing resource usage limits or throttling on cryptographic operations can help prevent resource exhaustion. Finally, maintain up-to-date incident response plans for availability-related incidents in space communication systems and coordinate with vendors and space agencies for timely patch deployment and vulnerability disclosures.
Affected Countries
France, Germany, Italy, United Kingdom, Spain, Belgium, Netherlands, Sweden, Norway, Finland
CVE-2026-22025: CWE-401: Missing Release of Memory after Effective Lifetime in nasa CryptoLib
Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2026-22025 is a vulnerability identified in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP), which secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability arises in versions prior to 1.4.3 when the Key Management Center (KMC) server responds with a non-200 HTTP status code. Under these conditions, the cryptography_encrypt() and cryptography_decrypt() functions return immediately without releasing previously allocated memory buffers, resulting in a memory leak of approximately 467 bytes per failed request. This leak accumulates with repeated failures, which can be triggered either by maliciously crafted server responses or network issues causing repeated errors. Over time, this memory exhaustion can degrade system performance or cause application crashes, impacting the availability of critical cryptographic operations in spacecraft communication systems. The vulnerability does not affect confidentiality or integrity directly, as it does not expose sensitive data or allow unauthorized data modification. Exploitation requires no authentication or user interaction, making it remotely exploitable over the network. The issue has been addressed in CryptoLib version 1.4.3, which properly frees memory buffers even when errors occur. No known exploits are currently reported in the wild. The CVSS v4.0 score of 6.3 reflects a medium severity, considering the network attack vector, lack of required privileges, and the impact limited to availability degradation. The vulnerability is classified under CWE-401 (Missing Release of Memory after Effective Lifetime) and CWE-770 (Allocation of Resources Without Limits or Throttling).
Potential Impact
For European organizations, the primary impact of CVE-2026-22025 is on the availability and reliability of systems using NASA's CryptoLib for securing spacecraft communications. This is particularly relevant for aerospace companies, satellite operators, and research institutions involved in space missions or satellite ground station operations. Memory exhaustion caused by repeated failed cryptographic operations can lead to system slowdowns, crashes, or denial of service, potentially disrupting critical communication links between spacecraft and ground control. While the vulnerability does not compromise confidentiality or integrity, the loss of availability in space communication systems can have severe operational consequences, including loss of telemetry data, command execution failures, and mission delays. European space agencies and contractors relying on CryptoLib or derivative implementations may face increased risk if they have not applied the patch. Additionally, organizations operating satellite ground stations or involved in space data processing could experience service interruptions. The vulnerability's exploitation does not require authentication, increasing the risk from external network-based attackers or misconfigured servers. However, the absence of known exploits in the wild suggests limited immediate threat but underscores the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2026-22025, European organizations should immediately upgrade to CryptoLib version 1.4.3 or later, where the memory leak issue has been resolved. In environments where immediate upgrade is not feasible, implement monitoring of memory usage in systems running CryptoLib to detect abnormal memory growth indicative of exploitation or network-induced failures. Network-level controls should be employed to ensure the integrity and reliability of the KMC server responses, including validating HTTP status codes and implementing retry logic with backoff to reduce repeated failed requests. Additionally, organizations should audit their cryptographic communication workflows to identify and remediate any misconfigurations that could cause frequent non-200 HTTP responses. Implementing resource usage limits or throttling on cryptographic operations can help prevent resource exhaustion. Finally, maintain up-to-date incident response plans for availability-related incidents in space communication systems and coordinate with vendors and space agencies for timely patch deployment and vulnerability disclosures.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T22:30:38.718Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6961a1f6ed32c7f018d59bee
Added to database: 1/10/2026, 12:48:54 AM
Last enriched: 1/10/2026, 1:05:06 AM
Last updated: 1/10/2026, 10:35:40 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
MediumCVE-2025-62235: CWE-290 Authentication Bypass by Spoofing in Apache Software Foundation Apache Mynewt NimBLE
UnknownCVE-2025-53477: CWE-476 NULL Pointer Dereference in Apache Software Foundation Apache Mynewt NimBLE
UnknownCVE-2025-53470: CWE-125 Out-of-bounds Read in Apache Software Foundation Apache Mynewt NimBLE
UnknownCVE-2025-52435: CWE-5 J2EE Misconfiguration: Data Transmission Without Encryption in Apache Software Foundation Apache Mynewt NimBLE
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.