Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22697: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib

0
High
VulnerabilityCVE-2026-22697cvecve-2026-22697cwe-122
Published: Sat Jan 10 2026 (01/10/2026, 00:31:11 UTC)
Source: CVE Database V5
Vendor/Project: nasa
Product: CryptoLib

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration is vulnerable to a heap buffer overflow when decoding Base64-encoded ciphertext/cleartext fields returned by the KMC service. The decode destination buffer is sized using an expected output length (len_data_out), but the Base64 decoder writes output based on the actual Base64 input length and does not enforce any destination size limit. An oversized Base64 string in the KMC JSON response can cause out-of-bounds writes on the heap, resulting in process crash and potentially code execution under certain conditions. This issue has been patched in version 1.4.3.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:42:10 UTC

Technical Analysis

CVE-2026-22697 is a heap-based buffer overflow vulnerability identified in NASA's CryptoLib, a software-only implementation of the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). CryptoLib is used to secure communications between spacecraft running the core Flight System (cFS) and ground stations. The vulnerability exists in versions prior to 1.4.3 within the KMC crypto service integration. Specifically, when decoding Base64-encoded ciphertext or cleartext fields returned by the KMC service, the destination buffer is allocated based on an expected output length (len_data_out). However, the Base64 decoder writes output based on the actual input length without enforcing a limit on the destination buffer size. This discrepancy allows an attacker to craft an oversized Base64 string in the KMC JSON response, causing out-of-bounds writes on the heap. The consequences include process crashes (denial of service) and potentially remote code execution under certain conditions. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no known exploits are reported in the wild, the vulnerability's CVSS score of 7.5 (high) reflects its significant impact on availability and the ease of exploitation. The flaw was patched in CryptoLib version 1.4.3 by correcting buffer size handling during Base64 decoding. This vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous software weakness that can lead to severe security breaches if exploited.

Potential Impact

For European organizations, especially those involved in aerospace, satellite communications, and space research, this vulnerability poses a critical risk. The affected CryptoLib is integral to securing spacecraft-to-ground communications, meaning exploitation could disrupt mission-critical data exchanges, leading to loss of availability and potential compromise of operational integrity. Although confidentiality and integrity impacts are not directly indicated, the possibility of remote code execution could allow attackers to escalate privileges or manipulate communications. Disruptions could affect satellite control, telemetry, and command functions, with cascading effects on dependent infrastructure and services. Given Europe's active participation in space programs (e.g., ESA member states) and aerospace industries, the vulnerability could impact national security, scientific missions, and commercial satellite operations. The lack of known exploits suggests a window for proactive mitigation, but the ease of exploitation and network accessibility heighten urgency. Organizations failing to patch may face denial of service or unauthorized code execution, potentially leading to mission failures or data manipulation.

Mitigation Recommendations

The primary mitigation is to upgrade CryptoLib to version 1.4.3 or later, where the heap buffer overflow has been patched. Organizations should audit their use of CryptoLib and related components to identify affected versions. Additionally, implement strict input validation on Base64-encoded data received from the KMC service, ensuring that input lengths do not exceed expected bounds before decoding. Employ runtime protections such as heap canaries, address space layout randomization (ASLR), and control flow integrity (CFI) to reduce exploitation risk. Conduct thorough code reviews and fuzz testing on cryptographic service integrations to detect similar buffer handling issues. Network segmentation and strict access controls can limit exposure of vulnerable services. Monitoring for anomalous KMC JSON responses or unexpected process crashes can provide early detection of exploitation attempts. Finally, coordinate with space communication partners to ensure consistent patch deployment and secure protocol implementations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.856Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961a1f6ed32c7f018d59bfe

Added to database: 1/10/2026, 12:48:54 AM

Last enriched: 1/17/2026, 7:42:10 AM

Last updated: 2/7/2026, 5:01:00 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats