Impact
The vulnerability arises from the use of Python’s pickle.load function within the cFS Pickle Module, allowing an attacker to deserialize crafted data and execute arbitrary code. The issue is confined to local attackers who can supply data to the component; a high level of technical skill and complexity is required to craft a successful exploit, but once achieved it can compromise the entire cFS installation by running arbitrary code.
Affected Systems
The affected product is NASA cFS, with all releases up to and including version 7.0.0. No specific subcomponents or modules are listed beyond the Pickle Module, but the vulnerability can impact any instance of cFS that uses this function without proper input validation.
Risk and Exploitability
The CVSS score is 2, indicating low severity, and the EPSS score is not available. The vulnerability is not listed in CISA’s KEV catalog. The attack requires local access and detailed knowledge of the pickle payload, which makes exploitation difficult in practice; however, in environments where local control is possible, the risk of local code execution remains present.
OpenCVE Enrichment