CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, an unsigned integer underflow in the `Crypto_TC_ProcessSecurity` function of CryptoLib leads to a heap buffer overflow. The vulnerability is triggered when the `fl` (frame length) field in a Telecommand (TC) packet is set to 0. This underflow causes the frame length to be interpreted as 65535, resulting in out-of-bounds memory access. This critical vulnerability can be exploited to cause a denial of service (DoS) or potentially achieve remote code execution. Users of CryptoLib are advised to apply the recommended patch or avoid processing untrusted TC packets until a fix is available.
References
Link | Resource |
---|---|
https://github.com/nasa/CryptoLib/commit/ca39cb96f21e76102aefb956d2c8c0ba0bd143ca | Patch |
https://github.com/nasa/CryptoLib/security/advisories/GHSA-3f5x-r59x-p8cf | Exploit Vendor Advisory |
Configurations
History
07 May 2025, 20:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 | |
First Time |
Nasa
Nasa cryptolib |
|
Summary |
|
|
CPE | cpe:2.3:a:nasa:cryptolib:*:*:*:*:*:*:*:* | |
References | () https://github.com/nasa/CryptoLib/commit/ca39cb96f21e76102aefb956d2c8c0ba0bd143ca - Patch | |
References | () https://github.com/nasa/CryptoLib/security/advisories/GHSA-3f5x-r59x-p8cf - Exploit, Vendor Advisory |
17 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-17 23:15
Updated : 2025-05-07 20:42
NVD link : CVE-2025-29912
Mitre link : CVE-2025-29912
CVE.ORG link : CVE-2025-29912
JSON object : View
Products Affected
nasa
- cryptolib