Cyber Posture

CVE-2025-29913

CriticalPublic PoC

Published: 17 March 2025

Published
17 March 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0076 73.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-29913 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Nasa Cryptolib. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 26.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Memory protection mechanisms like address space layout randomization and data execution prevention directly mitigate heap buffer overflow exploitation from the integer underflow in Crypto_TC_Prep_AAD.

prevent

Validating telecommand frames for proper lengths and structure prevents the unsigned integer underflow that triggers out-of-bounds access in the ingest buffer.

prevent

Flaw remediation requires patching the CryptoLib library to fix the tc_mac_start_index underflow calculation in versions 1.3.3 and prior.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability allows remote network exploitation (AV:N, PR:N, UI:N) via crafted telecommand frames to trigger memory corruption leading to RCE or DoS, directly mapping to T1190 (Exploit Public-Facing Application) and T1210 (Exploitation of Remote Services).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A critical heap buffer overflow vulnerability was…

more

identified in the `Crypto_TC_Prep_AAD` function of CryptoLib versions 1.3.3 and prior. This vulnerability allows an attacker to trigger a Denial of Service (DoS) or potentially execute arbitrary code (RCE) by providing a maliciously crafted telecommand (TC) frame that causes an unsigned integer underflow. The vulnerability lies in the function `Crypto_TC_Prep_AAD`, specifically during the computation of `tc_mac_start_index`. The affected code incorrectly calculates the MAC start index without ensuring it remains within the bounds of the `ingest` buffer. When `tc_mac_start_index` underflows due to an incorrect length calculation, the function attempts to access an out-of-bounds memory location, leading to a segmentation fault. The vulnerability is still present in the repository as of commit `d3cc420ace96d02a5b7e83d88cbd2e48010d5723`.

Deeper analysisAI

CVE-2025-29913 is a critical heap buffer overflow vulnerability in the CryptoLib library, versions 1.3.3 and prior. CryptoLib implements a software-only solution based on the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) for securing communications between a spacecraft running the core Flight System (cFS) and a ground station. The flaw resides in the `Crypto_TC_Prep_AAD` function, where an unsigned integer underflow occurs during the computation of `tc_mac_start_index`. This miscalculation fails to ensure the index stays within the bounds of the `ingest` buffer, resulting in an attempt to access an out-of-bounds memory location and a segmentation fault. The issue is associated with CWE-125 (Out-of-bounds Read) and CWE-191 (Integer Underflow), and it persists in the repository as of commit `d3cc420ace96d02a5b7e83d88cbd2e48010d5723`.

The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), earning a CVSS v3.1 base score of 9.8 (Critical) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). An attacker capable of sending telecommands (TC) to the affected system—such as a ground station or spacecraft—can supply a maliciously crafted TC frame to trigger the underflow. This leads to a denial of service via segmentation fault or, potentially, remote code execution if the out-of-bounds access allows further exploitation.

The GitHub security advisory at https://github.com/nasa/CryptoLib/security/advisories/GHSA-q4v2-fvrv-qrf6 provides further details on the issue. No specific patches or mitigations are detailed in the available information beyond awareness of the ongoing presence in the repository.

Details

CWE(s)

Affected Products

nasa
cryptolib
≤ 1.4.0

CVEs Like This One

CVE-2025-29909Same product: Nasa Cryptolib
CVE-2025-29912Same product: Nasa Cryptolib
CVE-2025-54878Same product: Nasa Cryptolib
CVE-2026-21897Same product: Nasa Cryptolib
CVE-2026-22697Same product: Nasa Cryptolib
CVE-2025-30216Same product: Nasa Cryptolib
CVE-2026-22023Same product: Nasa Cryptolib
CVE-2026-21898Same product: Nasa Cryptolib
CVE-2025-29911Same product: Nasa Cryptolib
CVE-2026-22026Same product: Nasa Cryptolib

References