Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22027: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib

0
Medium
VulnerabilityCVE-2026-22027cvecve-2026-22027cwe-122
Published: Sat Jan 10 2026 (01/10/2026, 00:24:58 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 01:04:50 UTC

Technical Analysis

CVE-2026-22027 is a heap-based buffer overflow vulnerability identified in NASA's CryptoLib, a software-only cryptographic library implementing the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This protocol secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability resides in the convert_hexstring_to_byte_array() function within the MariaDB SA interface component of CryptoLib versions prior to 1.4.3. This function decodes hex strings from the database into byte arrays but fails to verify that the caller-provided buffer has sufficient capacity before writing the decoded bytes. Consequently, if a malformed or oversized hex string is present in the database fields such as IV, ARSN, or ABM, the function writes beyond the allocated buffer, causing heap memory corruption. This can lead to unpredictable behavior including application crashes, data corruption, or potentially arbitrary code execution if an attacker can control the input. Exploitation requires local access with high privileges, as indicated by the CVSS vector (AV:L/PR:H), and no user interaction is necessary. The vulnerability impacts confidentiality, integrity, and availability due to the potential for memory corruption and privilege escalation. The flaw has been addressed in CryptoLib version 1.4.3 by adding proper capacity checks. No public exploits or active exploitation campaigns have been reported to date. Organizations using CryptoLib in aerospace or space communication systems should assess their versions and apply the patch promptly to mitigate risks.

Potential Impact

For European organizations, particularly those engaged in aerospace, satellite communications, or space research, this vulnerability poses a risk of memory corruption that could disrupt critical communication links between spacecraft and ground stations. The heap overflow could lead to denial of service via application crashes or, in worst cases, privilege escalation allowing attackers to execute arbitrary code within the affected system. Given the specialized nature of CryptoLib and its use in securing space data links, exploitation could compromise mission-critical operations, data integrity, and confidentiality of sensitive aerospace communications. Although exploitation requires high privileges and local access, insider threats or compromised administrative accounts could leverage this vulnerability to escalate control or disrupt operations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as space agencies and contractors in Europe increasingly collaborate on satellite and space missions. Disruption or compromise of these systems could have cascading effects on national security, scientific research, and commercial satellite services.

Mitigation Recommendations

European organizations should immediately verify if they are running CryptoLib versions prior to 1.4.3 and plan an urgent upgrade to version 1.4.3 or later where the vulnerability is patched. Since the vulnerability arises from unchecked buffer writes in the MariaDB SA interface, organizations should audit their use of database inputs related to CryptoLib and implement strict input validation and sanitization for hex string fields to prevent malformed or oversized data from being processed. Restricting access to systems running CryptoLib to trusted administrators and enforcing the principle of least privilege will reduce the risk of exploitation. Additionally, monitoring for unusual application crashes or memory corruption events in systems using CryptoLib can provide early detection of attempted exploitation. Employing runtime protections such as heap memory integrity checks and address space layout randomization (ASLR) can further mitigate exploitation impact. Finally, organizations should engage with NASA or the CryptoLib maintainers for any additional security advisories and follow best practices for securing aerospace communication infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.718Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961a1f6ed32c7f018d59bf8

Added to database: 1/10/2026, 12:48:54 AM

Last enriched: 1/10/2026, 1:04:50 AM

Last updated: 1/10/2026, 10:37:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats