// For flags

CVE-2025-29909

CryptoLib's Crypto_TC_ApplySecurity() Has a Heap Buffer Overflow Vulnerability

Severity Score

8.9
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a heap buffer overflow vulnerability in CryptoLib's `Crypto_TC_ApplySecurity()` allows an attacker to craft a malicious TC frame that causes out-of-bounds memory writes. This can result in denial of service (DoS) or, under certain conditions, remote code execution (RCE). Any application or system that relies on CryptoLib for Telecommand (TC) processing and does not strictly validate incoming TC frames is at risk. This includes satellite ground stations or mission control software where attackers can inject malformed frames. A patch is available at commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc.

CryptoLib ofrece una solución exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales (SDLS-EP) del CCSDS para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estación terrestre. En las versiones 1.3.3 y anteriores, una vulnerabilidad de desbordamiento de búfer en la pila de `Crypto_TC_ApplySecurity()` de CryptoLib permite a un atacante manipular una trama TC maliciosa que provoca escrituras fuera de los límites de memoria. Esto puede provocar una denegación de servicio (DoS) o, en determinadas circunstancias, la ejecución remota de código (RCE). Cualquier aplicación o sistema que dependa de CryptoLib para el procesamiento de telecomandos (TC) y no valide estrictamente las tramas TC entrantes está en riesgo. Esto incluye estaciones terrestres de satélite o software de control de misión, donde los atacantes pueden inyectar tramas malformadas. Hay un parche disponible en el commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-03-12 CVE Reserved
  • 2025-03-17 CVE Published
  • 2025-03-18 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-191: Integer Underflow (Wrap or Wraparound)
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nasa
Search vendor "Nasa"
CryptoLib
Search vendor "Nasa" for product "CryptoLib"
<= 1.3.3
Search vendor "Nasa" for product "CryptoLib" and version " <= 1.3.3"
en
Affected