Heap Overflow Vulnerability in CryptoLib Affecting NASA's Space Data Link Security Protocol
CVE-2025-30216
Key Information:
Badges
What is CVE-2025-30216?
CVE-2025-30216 is a significant heap overflow vulnerability found in CryptoLib, a software developed by NASA that implements the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library is designed to secure communications between spacecraft operating on the core Flight System (cFS) and ground stations. With this vulnerability, attackers could exploit a flaw in the Crypto_TM_ProcessSecurity function, potentially leading to severe consequences for organizations relying on this protocol for spacecraft data integrity and transmission security.
Technical Details
The vulnerability arises in versions 1.3.3 and earlier, specifically during the processing of the Secondary Header Length in telemetry (TM) protocol packets. If the Secondary Header Length is greater than the packet's total length, a heap overflow occurs in the memcpy operation that attempts to copy data into a dynamically allocated buffer named p_new_dec_frame. This can allow attackers to overwrite adjacent memory areas within the heap, resulting in possible arbitrary code execution or instability within the system.
Potential Impact of CVE-2025-30216
-
Arbitrary Code Execution: Exploiting this vulnerability may enable attackers to execute arbitrary code on the affected systems, leading to unauthorized control or manipulation of critical spacecraft systems.
-
System Instability: The heap overflow can result in system crashes or instability, jeopardizing essential communications between spacecraft and ground stations and potentially disrupting mission operations.
-
Data Security Compromise: Given the vulnerability exists in a security protocol, successful exploitation could compromise the integrity and confidentiality of transmitted data, posing a significant risk in terms of lost or corrupted information during space operations.
Affected Version(s)
CryptoLib <= 1.3.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
