{"id":159081,"date":"2025-11-29T12:10:14","date_gmt":"2025-11-29T12:10:14","guid":{"rendered":"https:\/\/www.newsbeep.com\/il\/159081\/"},"modified":"2025-11-29T12:10:14","modified_gmt":"2025-11-29T12:10:14","slug":"nasa-mission-control-security-bug-stayed-hidden-for-3-years","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/il\/159081\/","title":{"rendered":"NASA Mission Control Security Bug Stayed Hidden For 3 Years"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.newsbeep.com\/il\/wp-content\/uploads\/2025\/11\/1764418214_321_0x0.jpg\" alt=\"NASA logo seen displayed on a smartphone with programming code on screen behind.\" data-height=\"1224\" data-width=\"1769\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Researchers reveal NASA vulnerability that went unfixed for three years.<\/p>\n<p>SOPA Images\/LightRocket via Getty Images<\/p>\n<p>Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn\u2019t, \u201cinfluence or disrupt spacecraft operations in mission-significant ways,\u201d Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here\u2019s everything you need to know as cybersecurity in space comes under the spotlight.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/cisa-warns-iphone-and-android-users---secure-your-smartphone-now\/\" target=\"_blank\" aria-label=\"CISA Warns iPhone And Android Users \u2014 Secure Your Smartphone Now\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/cisa-warns-iphone-and-android-users---secure-your-smartphone-now\/\" rel=\"nofollow noopener\">ForbesCISA Warns iPhone And Android Users \u2014 Secure Your Smartphone NowBy Davey Winder<\/a>When NASA Authentication Code Becomes A Space Attack Vector<\/p>\n<p>Authentication code is the glue holding many security systems together. Whether you are talking about basic-level <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/15\/new-attack-alert-as-android-2fa-codes-stolen-in-30-seconds-flat\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/15\/new-attack-alert-as-android-2fa-codes-stolen-in-30-seconds-flat\/\" target=\"_self\" aria-label=\"two-factor authentication\" rel=\"nofollow noopener\">two-factor authentication<\/a> as used to help secure our apps, or the more advanced stuff used to encrypt data within things like <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/26\/microsoft-windows-bitlocker-vulnerability-exposes-passwords-act-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/26\/microsoft-windows-bitlocker-vulnerability-exposes-passwords-act-now\/\" target=\"_self\" aria-label=\"Windows BitLocker\" rel=\"nofollow noopener\">Windows BitLocker<\/a>.<\/p>\n<p>When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE\u2019s autonomous analyzer, was uncovered in the authentication path. Tracked as <a class=\"color-link\" href=\"https:\/\/github.com\/nasa\/CryptoLib\/security\/advisories\/GHSA-jw5c-58hr-m3v3\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/github.com\/nasa\/CryptoLib\/security\/advisories\/GHSA-jw5c-58hr-m3v3\" aria-label=\"CVE-2025-59534\">CVE-2025-59534<\/a>, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. \u201cFor over 1,100 days,\u201d Fort said, \u201cauthentication code meant to secure spacecraft communications contained a command injection vulnerability.\u201dA rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days.<\/p>\n<p>\u201cThe vulnerability transformed what should be a routine authentication configuration into a weapon,\u201d Fort told me in an exclusive interview, adding that \u201can attacker who can control either the username or keytab file path configuration values (perhaps through <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/14\/800-million-compromised-passwords---what-you-need-to-know\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/14\/800-million-compromised-passwords---what-you-need-to-know\/\" target=\"_self\" aria-label=\"compromised operator credentials\" rel=\"nofollow noopener\">compromised operator credentials<\/a> or social engineering) can inject arbitrary commands that execute with full system privileges.\u201d If it needs spelling out, when it comes to spacecraft operations, this is particularly dangerous as \u201cthat authentication configuration often happens during mission setup or system maintenance, periods when security vigilance might be focused elsewhere.\u201d<\/p>\n<p>Just how dangerous this security vulnerability was can be seen in the potential havoc it could wreak if exploited. Fort told me that, in very practical terms, this could include:<\/p>\n<p>In practical terms, this could enable:<\/p>\n<p>Access to classified mission data.Injecting false telemetry data or disrupting communications during critical mission phases.Command and control compromise.Compromising the ground infrastructure that connects mission controllers to vehicles in orbit<a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/fbi-warns-that-hackers-are-posing-as-fake-feds---what-you-need-to-know\/\" target=\"_blank\" aria-label=\"FBI Warns That Hackers Are Posing As Fake Feds \u2014 What You Need To Know\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/fbi-warns-that-hackers-are-posing-as-fake-feds---what-you-need-to-know\/\" rel=\"nofollow noopener\">ForbesFBI Warns That Hackers Are Posing As Fake Feds \u2014 What You Need To KnowBy Davey Winder<\/a>What You Need To Know About The NASA CVE-2025-59534 Vulnerability<\/p>\n<p>\u201cSpace missions rely on trustworthy cryptography. CryptoLib implements the Space Data Link Security protocol used across NASA missions,\u201d Fort explained, \u201cwhen that layer fails, spacecraft commands, telemetry, and science data are at stake.\u201d CVE-2025-59534 was that weak point. The vulnerable function built a \u2018kinit command string\u2019 from configuration values and executed it via system(). \u201cShell metacharacters in username or keytab\\_file\\_path turned configuration into code,\u201d Fort said, \u201ca design choice that made authentication code an execution vector.\u201d<\/p>\n<p>The reason it could stay undiscovered for so long is that \u201ca familiar system() pattern lived in a CAM\/keytab login path that teams rarely exercise,\u201d I was told,  \u201cwhile reviews and tests didn\u2019t include adversarial inputs and configuration was implicitly trusted.\u201d This meant that code review, static analysis, and fuzzing didn\u2019t flag it because it lives in configuration-handling code that looks harmless. \u201cThe triggering inputs are valid config strings with shell meta characters,\u201d Fort explained, \u201cwhich <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/14\/apple-iphone-usb-c-hacked-what-you-need-to-know\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/14\/apple-iphone-usb-c-hacked-what-you-need-to-know\/\" target=\"_self\" aria-label=\"fuzzers\" rel=\"nofollow noopener\">fuzzers<\/a> rarely explore.\u201d<\/p>\n<p>You can read the full technical report <a class=\"color-link\" href=\"https:\/\/aisle.com\/blog\/command-injection-in-nasa-cryptolib-cve-2025-59534\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/aisle.com\/blog\/command-injection-in-nasa-cryptolib-cve-2025-59534\" aria-label=\"here\">here<\/a>.<\/p>\n<p>A NASA spokesperson provided the following statement: \u201cNASA prioritizes the cybersecurity of its systems to ensure they remain safe, trustworthy, and reliable for visitors. In addition to continuously scanning our systems for vulnerabilities, we also invite the public and security researchers to report any potential problems or misuses of our systems in good faith, through our Vulnerability Disclosure Program. NASA takes prompt action to validate and resolve all third-party reports, identifying and mitigating them appropriately.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/do-not-download-these-windows-security-updates-experts-warn\/\" target=\"_blank\" aria-label=\"Do Not Download These Windows Security Updates, Experts Warn\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/27\/do-not-download-these-windows-security-updates-experts-warn\/\" rel=\"nofollow noopener\">ForbesDo Not Download These Windows Security Updates, Experts WarnBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images\/LightRocket via Getty Images Security vulnerability researchers&hellip;\n","protected":false},"author":2,"featured_media":159082,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[95860,95863,95862,85,46,95864,95859,95857,95861,95858,141,145,95865],"class_list":{"0":"post-159081","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-space","8":"tag-aisle","9":"tag-communications-between-nasa-and-earth","10":"tag-cryptolib","11":"tag-il","12":"tag-israel","13":"tag-mission-critical-nasa-security-vulnerability","14":"tag-nasa-crypto","15":"tag-nasa-security","16":"tag-nasa-spacecraft-operations","17":"tag-nasa-vulnerability","18":"tag-science","19":"tag-space","20":"tag-space-security"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/159081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/comments?post=159081"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/159081\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media\/159082"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media?parent=159081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/categories?post=159081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/tags?post=159081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}