CVE-2025-70085

9.8 CRITICAL

📋 TL;DR

This CVE describes a stack buffer overflow vulnerability in OpenSatKit 2.2.1's file management component. Attackers can exploit this by providing long filenames to trigger memory corruption, potentially leading to remote code execution. Systems running OpenSatKit 2.2.1 with the vulnerable file.c functions are affected.

💻 Affected Systems

Products:
  • OpenSatKit
Versions: 2.2.1
Operating Systems: Any OS running OpenSatKit
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the vulnerable file.c functions are affected. The vulnerability is in the core file management component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to execute arbitrary commands, steal data, or pivot to other systems.

🟠

Likely Case

Denial of service through application crashes or limited code execution within the application's context.

🟢

If Mitigated

Application crash without code execution if memory protections like ASLR are enabled and properly configured.

🌐 Internet-Facing: MEDIUM - Exploitation requires specific file operations, but if exposed via network interfaces, could be remotely exploitable.
🏢 Internal Only: HIGH - Internal attackers with access to file operations could exploit this to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific file operations with crafted long filenames. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub releases for versions after 2.2.1

Vendor Advisory: https://github.com/OpenSatKit/OpenSatKit

Restart Required: No

Instructions:

1. Check OpenSatKit GitHub for latest release. 2. Update to patched version. 3. Rebuild and redeploy the application.

🔧 Temporary Workarounds

Input Validation

all

Implement filename length restrictions before processing file operations

Implement validation to reject filenames longer than OS_MAX_PATH_LEN

Memory Protection

all

Enable stack protection mechanisms like stack canaries and ASLR

Compile with -fstack-protector-all and ensure ASLR is enabled

🧯 If You Can't Patch

  • Restrict file operations to trusted users only
  • Implement network segmentation to isolate OpenSatKit systems

🔍 How to Verify

Check if Vulnerable:

Check if running OpenSatKit version 2.2.1 and examine file.c for unsafe sprintf calls with EventErrStr buffer

Check Version:

Check OpenSatKit version in configuration or build metadata

Verify Fix Applied:

Verify updated version no longer contains vulnerable sprintf calls in file.c functions

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unusual file operations with long filenames
  • Memory access violation errors

Network Indicators:

  • Unusual file transfer patterns to OpenSatKit systems

SIEM Query:

Search for process crashes of OpenSatKit or file operations with path lengths exceeding normal thresholds

🔗 References

📤 Share & Export