Home

Description

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.2, there is a command Injection vulnerability in initialize_kerberos_keytab_file_login(). The vulnerability exists because the code directly interpolates user-controlled input into a shell command and executes it via system() without any sanitization or validation. This issue has been patched in version 1.4.2.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-23 | Updated 2025-09-23 | Assigner GitHub_M




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 1.4.2
affected

References

github.com/...ptoLib/security/advisories/GHSA-jw5c-58hr-m3v3

github.com/...ommit/3ccb1b306026bb20a028fbfdcf18935f7345ed2f

cve.org (CVE-2025-59534)

nvd.nist.gov (CVE-2025-59534)

Download JSON