Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22697: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib

0
High
VulnerabilityCVE-2026-22697cvecve-2026-22697cwe-122
Published: Sat Jan 10 2026 (01/10/2026, 00:31:11 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration is vulnerable to a heap buffer overflow when decoding Base64-encoded ciphertext/cleartext fields returned by the KMC service. The decode destination buffer is sized using an expected output length (len_data_out), but the Base64 decoder writes output based on the actual Base64 input length and does not enforce any destination size limit. An oversized Base64 string in the KMC JSON response can cause out-of-bounds writes on the heap, resulting in process crash and potentially code execution under certain conditions. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 01:03:18 UTC

Technical Analysis

CVE-2026-22697 identifies a heap-based buffer overflow vulnerability in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library secures communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in the KMC crypto service integration prior to version 1.4.3, specifically during the decoding of Base64-encoded ciphertext or cleartext fields returned by the KMC service. The decode destination buffer is allocated based on an expected output length (len_data_out), but the Base64 decoder writes output according to the actual Base64 input length without enforcing the destination buffer size limit. If an attacker supplies an oversized Base64 string in the KMC JSON response, this leads to out-of-bounds writes on the heap. Such heap corruption can cause the process to crash, resulting in denial of service, and under certain conditions, may allow an attacker to execute arbitrary code remotely. The vulnerability requires no authentication or user interaction, increasing its risk profile. Although no exploits are currently known in the wild, the vulnerability's CVSS score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects its high impact on availability and ease of exploitation. The issue has been addressed in CryptoLib version 1.4.3 by properly bounding the Base64 decode output to the allocated buffer size.

Potential Impact

For European organizations, particularly those involved in aerospace, satellite communications, and space research, this vulnerability poses a significant risk. Exploitation can lead to denial of service through process crashes, disrupting critical communication links between spacecraft and ground stations. In worst-case scenarios, it may allow remote code execution, potentially compromising the confidentiality and integrity of sensitive space mission data and control systems. Such disruptions could impact satellite operations, scientific missions, and national security-related space assets. Given the specialized nature of CryptoLib and its use in space communication protocols, the affected organizations are likely niche but critical. The impact extends to any European aerospace contractors, research institutions, and governmental agencies relying on this software for secure spacecraft communications. The absence of required authentication or user interaction lowers the barrier for exploitation, increasing the threat level.

Mitigation Recommendations

European organizations should immediately verify if they use CryptoLib versions prior to 1.4.3 in their space communication infrastructure. The primary mitigation is to upgrade to CryptoLib version 1.4.3 or later, where the vulnerability is patched. Additionally, organizations should implement strict validation of Base64 input lengths before decoding to prevent buffer overflows. Employ runtime protections such as heap integrity checks and address space layout randomization (ASLR) to mitigate exploitation impact. Network-level filtering to restrict unexpected or malformed KMC service responses can reduce exposure. Conduct thorough code audits and fuzz testing on cryptographic service integrations to identify similar vulnerabilities. Finally, establish monitoring for anomalous process crashes or unusual KMC service responses that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.856Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f6ed32c7f018d59bfe

Added to database: 1/10/2026, 12:48:54 AM

Last enriched: 1/10/2026, 1:03:18 AM

Last updated: 1/10/2026, 10:36:37 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats