Cyber Posture

CVE-2025-29912

CriticalPublic PoC

Published: 17 March 2025

Published
17 March 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1298 94.1th percentile
Risk Priority 27 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-29912 is an unsigned integer underflow vulnerability in the Crypto_TC_ProcessSecurity function of CryptoLib versions 1.3.3 and prior, leading to a heap buffer overflow. CryptoLib is a software-only solution that implements the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. The issue is triggered when the fl (frame length) field in a Telecommand (TC) packet is set to 0, causing the frame length to underflow and be interpreted as 65535, which results in out-of-bounds memory access. It is associated with CWE-122, CWE-191, and CWE-787.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction required. An attacker capable of sending a malicious TC packet to a vulnerable system can trigger the underflow, enabling denial of service through crashes or potentially remote code execution via controlled memory corruption.

NASA's CryptoLib GitHub security advisory (GHSA-3f5x-r59x-p8cf) and patch commit (ca39cb96f21e76102aefb956d2c8c0ba0bd143ca) recommend applying the fix immediately. Until patched, users should avoid processing untrusted TC packets.

Details

CWE(s)
CWE-122CWE-191CWE-787

Affected Products

nasa
cryptolib
≤ 1.4.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated heap buffer overflow in network-facing TC packet processing function enables exploitation of public-facing application for RCE or DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References