Impact
The CryptoLib library implements the CCSDS Space Data Link Security Protocol for spacecraft and ground station communications. Its Crypto_AOS_ProcessSecurity function parses AOS frame hashes, but prior to version 1.4.3 it reads memory without properly checking bounds. This out-of-bounds read (CWE-125) can allow an attacker to read arbitrary data from the process’s address space, potentially exposing cryptographic keys or other sensitive information. The flaw does not directly allow code execution but provides a path for information disclosure that could compromise mission confidentiality.
Affected Systems
The affected systems are those running NASA’s CryptoLib before the 1.4.3 release. Any installation of CryptoLib that implements the CCSDS Space Data Link Security Protocol and processes AOS frames is vulnerable. Versions up to and including 1.4.2 lack the necessary bounds checks and therefore are at risk.
Risk and Exploitability
With a CVSS score of 8.2, this fault is considered high severity. The EPSS score is below 1 %, suggesting that exploitation is unlikely at present, and no record exists in the CISA KEV catalog. However, the weakness requires crafted input that reaches Crypto_AOS_ProcessSecurity, so an attacker would need the ability to inject or modify AOS frames on the communication link. If this condition is met, the out-of-bounds read could leak confidential material, but would not directly execute code.
OpenCVE Enrichment