CVE-2025-64096

CryptoLib · CryptoLib Multiple Products

A high-severity vulnerability has been discovered in CryptoLib software, which is used to secure communications between spacecraft and ground stations.

Executive summary

A high-severity vulnerability has been discovered in CryptoLib software, which is used to secure communications between spacecraft and ground stations. This flaw could allow a remote attacker to bypass security measures, potentially leading to the interception of sensitive satellite data, the injection of malicious commands, or a complete loss of communication with the spacecraft. Organizations using the affected software are at significant risk of mission compromise or loss of high-value space assets.

Vulnerability

The vulnerability exists within the component of CryptoLib that processes SDLS-EP security headers and payloads. A flaw, likely a buffer overflow or an improper handling of cryptographic session parameters, allows a remote, unauthenticated attacker to craft a malicious SDLS-EP packet. By sending this packet to either the spacecraft or the ground station, an attacker in a position to intercept or inject traffic (e.g., a man-in-the-middle) could bypass cryptographic protections, potentially leading to arbitrary code execution on the target system or the decryption of secure communications.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, reflecting the critical nature of the systems it protects. Successful exploitation could have catastrophic consequences, including the loss of confidentiality of sensitive telemetry data, the loss of integrity through the injection of unauthorized and potentially destructive commands to the spacecraft, and the loss of availability by disrupting the command and control link. The direct business impact includes the risk of mission failure, financial loss from a non-operational or lost satellite, and significant reputational damage. For government or defense-related missions, this could also pose a national security risk.

Remediation

Immediate Action: Apply the security updates provided by CryptoLib to all affected ground station and flight systems immediately. Prior to deployment, test the patch in a non-production environment if possible to ensure operational stability. After patching, closely monitor for any anomalous behavior and review system and access logs for any signs of compromise preceding the update.

Proactive Monitoring: Implement enhanced monitoring on ground station network segments. Specifically, look for malformed SDLS-EP packets, an unusual volume of connection resets or authentication failures, and any unexpected deviations in spacecraft telemetry or behavior. Network intrusion detection systems (NIDS) should be configured with rules to detect potential exploitation attempts against this protocol.

Compensating Controls: If immediate patching is not feasible (e.g., for an in-orbit spacecraft), implement the following controls:

  • Enforce strict network segmentation and firewall rules at the ground station to limit access to systems communicating with the spacecraft.
  • Increase the scrutiny of all commands sent to the spacecraft, potentially requiring multi-party authorization for critical maneuvers.
  • Utilize out-of-band communication channels, if available, to verify the integrity of the primary link.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity (CVSS 8.8) of this vulnerability and its impact on mission-critical space systems, we strongly recommend that organizations prioritize the immediate application of the vendor-supplied patches. Although this CVE is not currently listed on the CISA KEV list, the potential for catastrophic impact necessitates urgent action. Organizations should treat this as an active threat and immediately implement the remediation and monitoring steps outlined above. If patching is delayed for any reason, the specified compensating controls must be implemented without delay to reduce the attack surface.