First published: Tue Apr 01 2025(Updated: )
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In 1.3.3 and earlier, a heap buffer overflow vulnerability persists in the Crypto_TC_ApplySecurity function due to an incomplete validation check on the fl (frame length) field. Although CVE-2025-29912 addressed an underflow issue involving fl, the patch fails to fully prevent unsafe calculations. As a result, an attacker can still craft malicious frames that cause a negative tf_payload_len, which is then interpreted as a large unsigned value, leading to a heap buffer overflow in a memcpy call.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
CryptoLib CCSDS Space Data Link Security Protocol - Extended Procedures | <=1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30356 is classified as a high severity vulnerability due to the potential for heap buffer overflow.
To fix CVE-2025-30356, upgrade CryptoLib to version 1.3.4 or later, which addresses the heap buffer overflow issue.
The potential impacts of CVE-2025-30356 include remote code execution, data corruption, and denial of service.
CryptoLib versions 1.3.3 and earlier are affected by CVE-2025-30356, making them vulnerable to exploitation.
CryptoLib is designed to secure communications between aircraft and ground stations, and CVE-2025-30356 compromises this security.