Heap Overflow Vulnerability in CryptoLib Affecting NASA's Space Data Link Security Protocol
CVE-2025-30216

9.1CRITICAL

Key Information:

Vendor

Nasa

Status
Vendor
CVE Published:
25 March 2025

Badges

πŸ“ˆ Score: 157πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2025-30216?

CVE-2025-30216 is a significant heap overflow vulnerability found in CryptoLib, a software developed by NASA that implements the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP). This library is designed to secure communications between spacecraft operating on the core Flight System (cFS) and ground stations. With this vulnerability, attackers could exploit a flaw in the Crypto_TM_ProcessSecurity function, potentially leading to severe consequences for organizations relying on this protocol for spacecraft data integrity and transmission security.

Technical Details

The vulnerability arises in versions 1.3.3 and earlier, specifically during the processing of the Secondary Header Length in telemetry (TM) protocol packets. If the Secondary Header Length is greater than the packet's total length, a heap overflow occurs in the memcpy operation that attempts to copy data into a dynamically allocated buffer named p_new_dec_frame. This can allow attackers to overwrite adjacent memory areas within the heap, resulting in possible arbitrary code execution or instability within the system.

Potential Impact of CVE-2025-30216

  1. Arbitrary Code Execution: Exploiting this vulnerability may enable attackers to execute arbitrary code on the affected systems, leading to unauthorized control or manipulation of critical spacecraft systems.

  2. System Instability: The heap overflow can result in system crashes or instability, jeopardizing essential communications between spacecraft and ground stations and potentially disrupting mission operations.

  3. Data Security Compromise: Given the vulnerability exists in a security protocol, successful exploitation could compromise the integrity and confidentiality of transmitted data, posing a significant risk in terms of lost or corrupted information during space operations.

Affected Version(s)

CryptoLib <= 1.3.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-30216 : Heap Overflow Vulnerability in CryptoLib Affecting NASA's Space Data Link Security Protocol