The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab… The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab…

NASA Mission Control Security Bug Stayed Hidden For 3 Years

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Researchers reveal NASA vulnerability that went unfixed for three years.

SOPA Images/LightRocket via Getty Images

Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight.

ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone Now

When NASA Authentication Code Becomes A Space Attack Vector

Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker.

When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days.

“The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab file path configuration values (perhaps through compromised operator credentials or social engineering) can inject arbitrary commands that execute with full system privileges.” If it needs spelling out, when it comes to spacecraft operations, this is particularly dangerous as “that authentication configuration often happens during mission setup or system maintenance, periods when security vigilance might be focused elsewhere.”

Just how dangerous this security vulnerability was can be seen in the potential havoc it could wreak if exploited. Fort told me that, in very practical terms, this could include:

In practical terms, this could enable:

  • Access to classified mission data.
  • Injecting false telemetry data or disrupting communications during critical mission phases.
  • Command and control compromise.
  • Compromising the ground infrastructure that connects mission controllers to vehicles in orbit

ForbesFBI Warns That Hackers Are Posing As Fake Feds — What You Need To Know

What You Need To Know About The NASA CVE-2025-59534 Vulnerability

“Space missions rely on trustworthy cryptography. CryptoLib implements the Space Data Link Security protocol used across NASA missions,” Fort explained, “when that layer fails, spacecraft commands, telemetry, and science data are at stake.” CVE-2025-59534 was that weak point. The vulnerable function built a ‘kinit command string’ from configuration values and executed it via system(). “Shell metacharacters in username or keytab\_file\_path turned configuration into code,” Fort said, “a design choice that made authentication code an execution vector.”

The reason it could stay undiscovered for so long is that “a familiar system() pattern lived in a CAM/keytab login path that teams rarely exercise,” I was told, “while reviews and tests didn’t include adversarial inputs and configuration was implicitly trusted.” This meant that code review, static analysis, and fuzzing didn’t flag it because it lives in configuration-handling code that looks harmless. “The triggering inputs are valid config strings with shell meta characters,” Fort explained, “which fuzzers rarely explore.”

You can read the full technical report here.

A NASA spokesperson provided the following statement: “NASA prioritizes the cybersecurity of its systems to ensure they remain safe, trustworthy, and reliable for visitors. In addition to continuously scanning our systems for vulnerabilities, we also invite the public and security researchers to report any potential problems or misuses of our systems in good faith, through our Vulnerability Disclosure Program. NASA takes prompt action to validate and resolve all third-party reports, identifying and mitigating them appropriately.”

ForbesDo Not Download These Windows Security Updates, Experts Warn

Source: https://www.forbes.com/sites/daveywinder/2025/11/28/nasa-mission-control-security-bug-stayed-hidden-for-3-years/

Market Opportunity
Octavia Logo
Octavia Price(VIA)
$0.0022939
$0.0022939$0.0022939
+2.08%
USD
Octavia (VIA) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

South Korea’s $657 Million Exit from Tesla Signals a Big Crypto Pivot

South Korea’s $657 Million Exit from Tesla Signals a Big Crypto Pivot

In a dramatic shift in investment patterns, South Korean retail investors withdrew $657 million from Tesla stock in August 2025, representing the largest monthly outflow in more than two years. At the same time, by mid-2025, they had shifted more than $12 billion into U.S.-listed companies tied to cryptocurrency, indicating a deepening preference for digital […]
Share
Tronweekly2025/09/18 14:00
MetaMask to Launch Its Token Sooner Than Expected, Says ConsenSys CEO

MetaMask to Launch Its Token Sooner Than Expected, Says ConsenSys CEO

The post MetaMask to Launch Its Token Sooner Than Expected, Says ConsenSys CEO appeared first on Coinpedia Fintech News MetaMask, the world’s leading Web3 wallet and gateway to decentralized apps, is gearing up to launch its own token. In a recent interview, Consensys CEO and Ethereum co-founder Joe Lubin revealed that a MetaMask token could be launched much earlier than people think, sparking excitement among users and investors who have long been waiting for …
Share
CoinPedia2025/09/19 12:56
How is the xStocks tokenized stock market developing?

How is the xStocks tokenized stock market developing?

Author: Heechang Compiled by: TechFlow xStocks offers a tokenized stock service, allowing investors to trade tokenized versions of popular US stocks like Tesla in real time. While still in its early stages, it’s already showing some interesting signs of growth. Observation 1: Trading is concentrated in Tesla (TSLA) As in many emerging markets, trading activity has quickly concentrated on a handful of stocks. Data shows a high concentration of trading volume in the most well-known and volatile stocks, with Tesla being the most prominent example. This concentration is not surprising: liquidity tends to accumulate in assets that retail investors already favor, and early adopters often use familiar high-beta stocks to test new infrastructure. Observation 2: Liquidity decreases on weekends Data shows that on-chain equity trading volume drops to 30% or less of weekday levels over the weekend. Unlike crypto-native assets, which trade seamlessly around the clock, tokenized stocks still inherit the behavioral inertia of traditional market trading hours. Traders appear less willing to trade when reference markets (such as Nasdaq and the New York Stock Exchange) are closed, likely due to concerns about arbitrage, price gaps, and the inability to hedge positions off-chain. Observation 3: Prices move in line with the Nasdaq Another key signal comes from pricing behavior during the initial launch period. Initially, xStocks tokens traded at a significant premium to their Nasdaq counterparts, reflecting market enthusiasm and potential friction in bridging fiat liquidity. However, these premiums gradually diminished over time. Current trading patterns show that the token price is at the upper limit of Tesla's intraday price range and is highly consistent with the Nasdaq reference price. Arbitrageurs appear to be maintaining this price discipline, but there are still small deviations from the intraday highs, indicating some market inefficiencies that may present opportunities and risks for active traders. New opportunities for Korean stock investors? South Korean investors currently hold over $100 billion in US stocks, with trading volume increasing 17-fold since January 2020. Existing infrastructure for South Korean investors to trade US stocks is limited by high fees, long settlement times, and slow cash-out processes, creating opportunities for tokenized or on-chain mirror stocks. As the infrastructure and platforms supporting on-chain US stock markets continue to improve, a new group of South Korean traders will enter the crypto market, which is undoubtedly a huge opportunity.
Share
PANews2025/09/18 08:00