CVE-2026-22025 PUBLISHED

CryptoLib Memory Leak on HTTP Error Response in KMC Client

Assigner: GitHub_M
Reserved: 05.01.2026 Published: 10.01.2026 Updated: 13.01.2026

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVSS Score: 6.3

Product Status

Vendor nasa
Product CryptoLib
Versions
  • Version < 1.4.3 is affected

References

Problem Types

  • CWE-401: Missing Release of Memory after Effective Lifetime CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling CWE