Cyber Posture

CVE-2025-29913

CriticalPublic PoC

Published: 17 March 2025

Published
17 March 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0099 77.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Security Summary

CVE-2025-29913 is a critical heap buffer overflow vulnerability in the CryptoLib library, versions 1.3.3 and prior. CryptoLib implements a software-only solution based on the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) for securing communications between a spacecraft running the core Flight System (cFS) and a ground station. The flaw resides in the `Crypto_TC_Prep_AAD` function, where an unsigned integer underflow occurs during the computation of `tc_mac_start_index`. This miscalculation fails to ensure the index stays within the bounds of the `ingest` buffer, resulting in an attempt to access an out-of-bounds memory location and a segmentation fault. The issue is associated with CWE-125 (Out-of-bounds Read) and CWE-191 (Integer Underflow), and it persists in the repository as of commit `d3cc420ace96d02a5b7e83d88cbd2e48010d5723`.

The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), earning a CVSS v3.1 base score of 9.8 (Critical) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). An attacker capable of sending telecommands (TC) to the affected system—such as a ground station or spacecraft—can supply a maliciously crafted TC frame to trigger the underflow. This leads to a denial of service via segmentation fault or, potentially, remote code execution if the out-of-bounds access allows further exploitation.

The GitHub security advisory at https://github.com/nasa/CryptoLib/security/advisories/GHSA-q4v2-fvrv-qrf6 provides further details on the issue. No specific patches or mitigations are detailed in the available information beyond awareness of the ongoing presence in the repository.

Details

CWE(s)
CWE-125CWE-191

Affected Products

nasa
cryptolib
≤ 1.4.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability allows remote network exploitation (AV:N, PR:N, UI:N) via crafted telecommand frames to trigger memory corruption leading to RCE or DoS, directly mapping to T1190 (Exploit Public-Facing Application) and T1210 (Exploitation of Remote Services).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References