INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h
Vulnerabilities

CVE-2026-22023

High ⚡ Exploit Available
Out-of-Bounds Read Vulnerability in NASA CryptoLib SDLS-EP Implementation
CWE-125 — Weakness Type
Published: Jan 10, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.5
🔗 NVD Official
📄 Description (English)

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, there is an out-of-bounds heap read vulnerability in cryptography_aead_encrypt(). This issue has been patched in version 1.4.3.

🤖 AI Executive Summary

NASA's CryptoLib, used for securing spacecraft communications via CCSDS SDLS-EP protocol, contains a critical out-of-bounds heap read vulnerability (CWE-125) in the cryptography_aead_encrypt() function. The vulnerability, rated CVSS 7.5, allows attackers to read sensitive memory contents, potentially exposing cryptographic keys and classified data. A patch is available in version 1.4.3, and active exploits exist.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على مكتبة CryptoLib المستخدمة في أنظمة الطيران الأساسية (cFS) لتأمين الاتصالات الفضائية باستخدام بروتوكول CCSDS Space Data Link Security Protocol. تنشأ الثغرة من خلل في التحقق من حدود الذاكرة في دالة التشفير المصادق عليه مع البيانات المرتبطة (AEAD)، مما يسمح بقراءة بيانات حساسة من الذاكرة المكدسة خارج النطاق المخصص. يمكن استغلال هذه الثغرة للوصول إلى مفاتيح التشفير، بيانات الجلسات، أو معلومات حساسة أخرى مخزنة في الذاكرة. تشكل هذه الثغرة خطراً كبيراً على سرية البيانات في الأنظمة الفضائية والاتصالات الحساسة، خاصة في البيئات التي تتطلب مستويات عالية من الأمان مثل الأقمار الصناعية ومحطات التحكم الأرضية.

🤖 ملخص تنفيذي (AI)

تحتوي مكتبة CryptoLib من ناسا، المستخدمة لتأمين اتصالات المركبات الفضائية عبر بروتوكول CCSDS SDLS-EP، على ثغرة حرجة للقراءة خارج حدود الذاكرة المكدسة (CWE-125) في دالة cryptography_aead_encrypt(). تسمح الثغرة، المصنفة بدرجة خطورة 7.5 حسب CVSS، للمهاجمين بقراءة محتويات الذاكرة الحساسة، مما قد يكشف المفاتيح التشفيرية والبيانات السرية. يتوفر تصحيح أمني في الإصدار 1.4.3، وتوجد استغلالات نشطة للثغرة.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:11
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations operating satellite communications, space technology programs, or critical infrastructure using NASA's core Flight System (cFS) face significant risks of cryptographic key exposure and data breaches. This particularly affects entities under CITC regulation managing satellite ground stations, aerospace research facilities, and defense communications systems that may implement CCSDS protocols for secure space-to-ground links.
🏢 Affected Saudi Sectors
الاتصالات الفضائية والأقمار الصناعية الدفاع والأمن الوطني البحث العلمي والفضائي البنية التحتية الحرجة الاتصالات وتقنية المعلومات الطيران والملاحة الجوية
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately upgrade NASA CryptoLib to version 1.4.3 or later across all spacecraft communication systems, ground stations, and cFS implementations to patch the out-of-bounds read vulnerability
2. Conduct comprehensive security audits of all systems using CryptoLib to identify potential memory exposure incidents, review cryptographic key integrity, and rotate all encryption keys used in affected systems as a precautionary measure
3. Implement memory protection mechanisms such as Address Space Layout Randomization (ASLR) and stack canaries, establish continuous monitoring for abnormal memory access patterns in cryptographic operations, and restrict network access to SDLS-EP endpoints to authorized systems only
🔧 خطوات المعالجة (العربية)
1. الترقية الفورية لمكتبة NASA CryptoLib إلى الإصدار 1.4.3 أو أحدث عبر جميع أنظمة اتصالات المركبات الفضائية، المحطات الأرضية، وتطبيقات cFS لإصلاح ثغرة القراءة خارج الحدود
2. إجراء عمليات تدقيق أمني شاملة لجميع الأنظمة المستخدمة لمكتبة CryptoLib لتحديد حوادث كشف الذاكرة المحتملة، مراجعة سلامة المفاتيح التشفيرية، وتدوير جميع مفاتيح التشفير المستخدمة في الأنظمة المتأثرة كإجراء احترازي
3. تطبيق آليات حماية الذاكرة مثل العشوائية في تخطيط مساحة العناوين (ASLR) وحراس المكدس، إنشاء مراقبة مستمرة لأنماط الوصول غير الطبيعية للذاكرة في العمليات التشفيرية، وتقييد الوصول الشبكي لنقاط نهاية SDLS-EP للأنظمة المصرح بها فقط
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Vulnerability Management) ECC-2-1 (Secure System Development) ECC-3-1 (Cryptographic Controls) ECC-5-1 (Security Monitoring)
🔵 SAMA CSF
CCC-1.1 (Cybersecurity Governance) TVM-1.1 (Vulnerability Assessment) TVM-2.1 (Patch Management) DAR-4.1 (Cryptographic Protection)
🟡 ISO 27001:2022
A.12.6.1 (Management of Technical Vulnerabilities) A.14.2.1 (Secure Development Policy) A.10.1.1 (Cryptographic Controls) A.12.4.1 (Event Logging)
📦 Affected Products / CPE 1 entries
nasa:cryptolib
📊 CVSS Score
7.5
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityN — None / Network
IntegrityN — None / Network
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.5
CWECWE-125
EPSS0.02%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-10
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available patch-available CWE-125
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.