CVE-2025-29913

9.8 CRITICAL

📋 TL;DR

A critical heap buffer overflow vulnerability in CryptoLib versions 1.3.3 and prior allows attackers to cause denial of service or potentially execute arbitrary code by sending maliciously crafted telecommand frames. This affects spacecraft communications secured with the SDLS-EP protocol using vulnerable CryptoLib implementations. Space agencies and organizations using cFS with CryptoLib for spacecraft-ground communications are at risk.

💻 Affected Systems

Products:
  • NASA CryptoLib
Versions: 1.3.3 and prior
Operating Systems: All platforms running cFS with CryptoLib
Default Config Vulnerable: ⚠️ Yes
Notes: Affects spacecraft using cFS with CryptoLib for SDLS-EP secured communications. Vulnerability exists in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on spacecraft systems, allowing complete compromise of spacecraft operations and potential mission failure.

🟠

Likely Case

Denial of service causing loss of spacecraft communications and control, requiring ground intervention to restore operations.

🟢

If Mitigated

Segmentation fault causing temporary communication disruption until system restart, with no persistent compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malicious telecommand frames to vulnerable systems. No public exploit code available as of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.4 or later

Vendor Advisory: https://github.com/nasa/CryptoLib/security/advisories/GHSA-q4v2-fvrv-qrf6

Restart Required: Yes

Instructions:

1. Update CryptoLib to version 1.3.4 or later. 2. Rebuild and redeploy cFS applications using CryptoLib. 3. Restart affected spacecraft systems.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement telecommand frame validation to reject malformed frames before processing by CryptoLib

# Custom implementation required based on cFS configuration

Network Segmentation

all

Isolate spacecraft communication networks from untrusted sources

# Configure firewall rules to restrict telecommand sources

🧯 If You Can't Patch

  • Implement strict network access controls to limit telecommand sources to authorized ground stations only
  • Deploy intrusion detection systems to monitor for anomalous telecommand patterns and block suspicious traffic

🔍 How to Verify

Check if Vulnerable:

Check CryptoLib version in use. If version <= 1.3.3, system is vulnerable.

Check Version:

Check build configuration or source code for CryptoLib version identifier

Verify Fix Applied:

Verify CryptoLib version is 1.3.4 or later and confirm successful deployment of updated cFS applications.

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in cFS logs
  • Unexpected process termination of CryptoLib components
  • Telecommand processing failures

Network Indicators:

  • Unusual telecommand frame patterns
  • Multiple failed telecommand attempts from single source
  • Traffic spikes to telecommand ports

SIEM Query:

source="cfs_logs" AND ("segmentation fault" OR "Crypto_TC_Prep_AAD" OR "buffer overflow")

🔗 References

📤 Share & Export