Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.
Published: 2026-01-10
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak leading to Denial of Service
Action: Patch
AI Analysis

Impact

CryptoLib implements the CCSDS Space Data Link Security Protocol – Extended Procedures for secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions before 1.4.3, if the KMC client receives a non‑200 HTTP response, the cryptography_encrypt() and cryptography_decrypt() functions return immediately without freeing previously allocated buffers, leaking approximately 467 bytes of memory with each failure. Repeated failures can accumulate enough leaked data to exhaust available memory, potentially causing application crashes or degraded performance, and thereby leading to service disruption. The vulnerability maps to CWE‑401 (Memory Leak) and CWE‑770 (Out‑of‑Band Resource Exhaustion).

Affected Systems

The affected system is the NASA CryptoLib package. All releases before 1.4.3, including 1.4.2 and earlier versions, are vulnerable. Any deployment that uses CryptoLib for cryptographic functions in KMC client applications is impacted.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. The EPSS score of less than 1 % suggests a very low probability of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to trigger multiple failed HTTP interactions with a KMC client, either by controlling a malicious KMC server or by inducing network errors. The impact is limited to increased memory consumption and potential denial of service, with no direct compromise of data confidentiality or integrity.

Generated by OpenCVE AI on April 18, 2026 at 19:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official CryptoLib patch by upgrading to version 1.4.3 or later.
  • Configure the KMC client to handle non‑200 responses promptly and limit the number of retry attempts to mitigate resource exhaustion.
  • In environments where the patch cannot be applied immediately, monitor the memory usage of CryptoLib‑dependent processes and restart or terminate services before memory exhaustion occurs to prevent denial of service.

Generated by OpenCVE AI on April 18, 2026 at 19:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nasa:cryptolib:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Tue, 13 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Nasa
Nasa cryptolib
Vendors & Products Nasa
Nasa cryptolib

Sat, 10 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.
Title CryptoLib Memory Leak on HTTP Error Response in KMC Client
Weaknesses CWE-401
CWE-770
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-13T20:19:08.707Z

Reserved: 2026-01-05T22:30:38.718Z

Link: CVE-2026-22025

cve-icon Vulnrichment

Updated: 2026-01-13T20:19:05.716Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-10T01:16:18.703

Modified: 2026-01-16T16:39:52.060

Link: CVE-2026-22025

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:30:08Z

Weaknesses