NASA CryptoLib before 1.3.2 uses Extended Procedures that are a Work in Progress (not intended for use during flight), potentially leading to a keystream oracle.
The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.
Link | Tags |
---|---|
https://securitybynature.fr/post/hacking-cryptolib/ | exploit press/media coverage |
https://github.com/nasa/CryptoLib/compare/v1.3.1...v1.3.2 | product |
https://github.com/nasa/CryptoLib/pull/365 | patch |