The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab… The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab…

NASA Mission Control Security Bug Stayed Hidden For 3 Years

2025/11/28 22:55

Researchers reveal NASA vulnerability that went unfixed for three years.

SOPA Images/LightRocket via Getty Images

Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight.

ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone Now

When NASA Authentication Code Becomes A Space Attack Vector

Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker.

When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days.

“The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab file path configuration values (perhaps through compromised operator credentials or social engineering) can inject arbitrary commands that execute with full system privileges.” If it needs spelling out, when it comes to spacecraft operations, this is particularly dangerous as “that authentication configuration often happens during mission setup or system maintenance, periods when security vigilance might be focused elsewhere.”

Just how dangerous this security vulnerability was can be seen in the potential havoc it could wreak if exploited. Fort told me that, in very practical terms, this could include:

In practical terms, this could enable:

  • Access to classified mission data.
  • Injecting false telemetry data or disrupting communications during critical mission phases.
  • Command and control compromise.
  • Compromising the ground infrastructure that connects mission controllers to vehicles in orbit

ForbesFBI Warns That Hackers Are Posing As Fake Feds — What You Need To Know

What You Need To Know About The NASA CVE-2025-59534 Vulnerability

“Space missions rely on trustworthy cryptography. CryptoLib implements the Space Data Link Security protocol used across NASA missions,” Fort explained, “when that layer fails, spacecraft commands, telemetry, and science data are at stake.” CVE-2025-59534 was that weak point. The vulnerable function built a ‘kinit command string’ from configuration values and executed it via system(). “Shell metacharacters in username or keytab\_file\_path turned configuration into code,” Fort said, “a design choice that made authentication code an execution vector.”

The reason it could stay undiscovered for so long is that “a familiar system() pattern lived in a CAM/keytab login path that teams rarely exercise,” I was told, “while reviews and tests didn’t include adversarial inputs and configuration was implicitly trusted.” This meant that code review, static analysis, and fuzzing didn’t flag it because it lives in configuration-handling code that looks harmless. “The triggering inputs are valid config strings with shell meta characters,” Fort explained, “which fuzzers rarely explore.”

You can read the full technical report here.

A NASA spokesperson provided the following statement: “NASA prioritizes the cybersecurity of its systems to ensure they remain safe, trustworthy, and reliable for visitors. In addition to continuously scanning our systems for vulnerabilities, we also invite the public and security researchers to report any potential problems or misuses of our systems in good faith, through our Vulnerability Disclosure Program. NASA takes prompt action to validate and resolve all third-party reports, identifying and mitigating them appropriately.”

ForbesDo Not Download These Windows Security Updates, Experts Warn

Source: https://www.forbes.com/sites/daveywinder/2025/11/28/nasa-mission-control-security-bug-stayed-hidden-for-3-years/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny

Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny

The post Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny appeared on BitcoinEthereumNews.com. The cryptocurrency world is buzzing with a recent controversy surrounding a bold OpenVPP partnership claim. This week, OpenVPP (OVPP) announced what it presented as a significant collaboration with the U.S. government in the innovative field of energy tokenization. However, this claim quickly drew the sharp eye of on-chain analyst ZachXBT, who highlighted a swift and official rebuttal that has sent ripples through the digital asset community. What Sparked the OpenVPP Partnership Claim Controversy? The core of the issue revolves around OpenVPP’s assertion of a U.S. government partnership. This kind of collaboration would typically be a monumental endorsement for any private cryptocurrency project, especially given the current regulatory climate. Such a partnership could signify a new era of mainstream adoption and legitimacy for energy tokenization initiatives. OpenVPP initially claimed cooperation with the U.S. government. This alleged partnership was said to be in the domain of energy tokenization. The announcement generated considerable interest and discussion online. ZachXBT, known for his diligent on-chain investigations, was quick to flag the development. He brought attention to the fact that U.S. Securities and Exchange Commission (SEC) Commissioner Hester Peirce had directly addressed the OpenVPP partnership claim. Her response, delivered within hours, was unequivocal and starkly contradicted OpenVPP’s narrative. How Did Regulatory Authorities Respond to the OpenVPP Partnership Claim? Commissioner Hester Peirce’s statement was a crucial turning point in this unfolding story. She clearly stated that the SEC, as an agency, does not engage in partnerships with private cryptocurrency projects. This response effectively dismantled the credibility of OpenVPP’s initial announcement regarding their supposed government collaboration. Peirce’s swift clarification underscores a fundamental principle of regulatory bodies: maintaining impartiality and avoiding endorsements of private entities. Her statement serves as a vital reminder to the crypto community about the official stance of government agencies concerning private ventures. Moreover, ZachXBT’s analysis…
Share
BitcoinEthereumNews2025/09/18 02:13
Tom Lee Predicts Major Bitcoin Adoption Surge

Tom Lee Predicts Major Bitcoin Adoption Surge

The post Tom Lee Predicts Major Bitcoin Adoption Surge appeared on BitcoinEthereumNews.com. Key Points: Tom Lee suggests significant future Bitcoin adoption. Potential 200x increase in Bitcoin adoption forecast. Ethereum positioned as key settlement layer for tokenization. Tom Lee, co-founder of Fundstrat Global Advisors, predicted at Binance Blockchain Week that Bitcoin adoption could surge 200-fold amid shifts in institutional and retirement capital allocations. This outlook suggests a potential major restructuring of financial ecosystems, boosting Bitcoin and Ethereum as core assets, with tokenization poised to reshape markets significantly. Tom Lee Projects 200x Bitcoin Adoption Increase Tom Lee, known for his bullish stance on digital assets, suggested that Bitcoin might experience a 200 times adoption growth as more traditional retirement accounts transition to Bitcoin holdings. He predicts a break from Bitcoin’s traditional four-year cycle. Despite a market slowdown, Lee sees tokenization as a key trend with Wall Street eyeing on-chain financial products. The immediate implications suggest significant structural changes in digital finance. Lee highlighted that the adoption of a Bitcoin ETF by BlackRock exemplifies potential shifts in finance. If retirement funds begin reallocating to Bitcoin, it could catalyze substantial growth. Community reactions appear positive, with some experts agreeing that the tokenization of traditional finance is inevitable. Statements from Lee argue that Ethereum’s role in this transformation is crucial, resonating with broader positive sentiment from institutional and retail investors. As Lee explained, “2025 is the year of tokenization,” highlighting U.S. policy shifts and stablecoin volumes as key components of a bullish outlook. source Bitcoin, Ethereum, and the Future of Finance Did you know? Tom Lee suggests Bitcoin might deviate from its historical four-year cycle, driven by massive institutional interest and tokenization trends, potentially marking a new era in cryptocurrency adoption. Bitcoin (BTC) trades at $92,567.31, dominating 58.67% of the market. Its market cap stands at $1.85 trillion with a fully diluted market cap of $1.94 trillion.…
Share
BitcoinEthereumNews2025/12/05 10:42
‘Real product market fit’ – Can Chainlink’s ETF moment finally unlock $20?

‘Real product market fit’ – Can Chainlink’s ETF moment finally unlock $20?

The post ‘Real product market fit’ – Can Chainlink’s ETF moment finally unlock $20? appeared on BitcoinEthereumNews.com. Chainlink has officially joined the U.S. Spot ETF club, following Grayscale’s successful debut on the 3rd of December.  The product achieved $13 million in day-one trading volume, significantly lower than the Solana [SOL] and Ripple [XRP], which saw $56 million and $33 million during their respective launches.  However, the Grayscale spot Chainlink [LINK] ETF saw $42 million in inflows during the launch. Reacting to the performance, Bloomberg ETF analyst Eric Balchunas called it “another insta-hit.” “Also $41m in first day flows. Another insta-hit from the crypto world, only dud so far was Doge, but it’s still early.” Source: Bloomberg For his part, James Seyffart, another Bloomberg ETF analyst, said the debut volume was “strong” and “impressive.” He added,  “Chainlink showing that longer tail assets can find success in the ETF wrapper too.” The performance also meant broader market demand for LINK exposure, noted Peter Mintzberg, Grayscale CEO.  Impact on LINK markets Bitwise has also applied for a Spot LINK ETF and could receive the green light to trade soon. That said, LINK’s Open Interest (OI) surged from $194 million to nearly $240 million after the launch.  The surge indicated a surge in speculative interest for the token on the Futures market.  Source: Velo By extension, it also showed bullish sentiment following the debut. On the price charts, LINK rallied 8.6%, extending its weekly recovery to over 20% from around $12 to $15 before easing to $14.4 as of press time. It was still 47% down from the recent peak of $27.  The immediate overheads for bulls were $15 and $16, and clearing them could raise the odds for tagging $20. Especially if the ETF inflows extend.  Source: LINK/USDT, TradingView Assessing Chainlink’s growth Chainlink has grown over the years and has become the top decentralized oracle provider, offering numerous blockchain projects…
Share
BitcoinEthereumNews2025/12/05 10:26