The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab… The post NASA Mission Control Security Bug Stayed Hidden For 3 Years appeared on BitcoinEthereumNews.com. Researchers reveal NASA vulnerability that went unfixed for three years. SOPA Images/LightRocket via Getty Images Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight. ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone NowBy Davey Winder When NASA Authentication Code Becomes A Space Attack Vector Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker. When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days. “The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab…

NASA Mission Control Security Bug Stayed Hidden For 3 Years

2025/11/28 22:55

Researchers reveal NASA vulnerability that went unfixed for three years.

SOPA Images/LightRocket via Getty Images

Security vulnerability researchers have exclusively revealed to me that a critical bug remained hidden in the software protecting communications between NASA spacecraft and Earth for an incredible three years. A successful attacker could, but fortunately didn’t, “influence or disrupt spacecraft operations in mission-significant ways,” Stanislav Fort, co-founder and chief scientist at AISLE, the security organization that discovered and responsibly disclosed the vulnerability to NASA, said. Here’s everything you need to know as cybersecurity in space comes under the spotlight.

ForbesCISA Warns iPhone And Android Users — Secure Your Smartphone Now

When NASA Authentication Code Becomes A Space Attack Vector

Authentication code is the glue holding many security systems together. Whether you are talking about basic-level two-factor authentication as used to help secure our apps, or the more advanced stuff used to encrypt data within things like Windows BitLocker.

When it comes to mission-critical software, such as that developed and used by NASA and crucial for protecting the communications between spacecraft and Earth, you would hope that authentication is both highly advanced and highly secure. Yet a critical flaw in CryptoLib, unearthed, pardon the pun, by AISLE’s autonomous analyzer, was uncovered in the authentication path. Tracked as CVE-2025-59534, it turned out that the vulnerability had stayed hidden in plain sight for three years, between September 2022 and September 2025. “For over 1,100 days,” Fort said, “authentication code meant to secure spacecraft communications contained a command injection vulnerability.”A rapid response by NASA ensured that, upon disclosure, the vulnerability was fixed within four days.

“The vulnerability transformed what should be a routine authentication configuration into a weapon,” Fort told me in an exclusive interview, adding that “an attacker who can control either the username or keytab file path configuration values (perhaps through compromised operator credentials or social engineering) can inject arbitrary commands that execute with full system privileges.” If it needs spelling out, when it comes to spacecraft operations, this is particularly dangerous as “that authentication configuration often happens during mission setup or system maintenance, periods when security vigilance might be focused elsewhere.”

Just how dangerous this security vulnerability was can be seen in the potential havoc it could wreak if exploited. Fort told me that, in very practical terms, this could include:

In practical terms, this could enable:

  • Access to classified mission data.
  • Injecting false telemetry data or disrupting communications during critical mission phases.
  • Command and control compromise.
  • Compromising the ground infrastructure that connects mission controllers to vehicles in orbit

ForbesFBI Warns That Hackers Are Posing As Fake Feds — What You Need To Know

What You Need To Know About The NASA CVE-2025-59534 Vulnerability

“Space missions rely on trustworthy cryptography. CryptoLib implements the Space Data Link Security protocol used across NASA missions,” Fort explained, “when that layer fails, spacecraft commands, telemetry, and science data are at stake.” CVE-2025-59534 was that weak point. The vulnerable function built a ‘kinit command string’ from configuration values and executed it via system(). “Shell metacharacters in username or keytab\_file\_path turned configuration into code,” Fort said, “a design choice that made authentication code an execution vector.”

The reason it could stay undiscovered for so long is that “a familiar system() pattern lived in a CAM/keytab login path that teams rarely exercise,” I was told, “while reviews and tests didn’t include adversarial inputs and configuration was implicitly trusted.” This meant that code review, static analysis, and fuzzing didn’t flag it because it lives in configuration-handling code that looks harmless. “The triggering inputs are valid config strings with shell meta characters,” Fort explained, “which fuzzers rarely explore.”

You can read the full technical report here.

A NASA spokesperson provided the following statement: “NASA prioritizes the cybersecurity of its systems to ensure they remain safe, trustworthy, and reliable for visitors. In addition to continuously scanning our systems for vulnerabilities, we also invite the public and security researchers to report any potential problems or misuses of our systems in good faith, through our Vulnerability Disclosure Program. NASA takes prompt action to validate and resolve all third-party reports, identifying and mitigating them appropriately.”

ForbesDo Not Download These Windows Security Updates, Experts Warn

Source: https://www.forbes.com/sites/daveywinder/2025/11/28/nasa-mission-control-security-bug-stayed-hidden-for-3-years/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

This Exclusive Cayman Getaway Tastes As Good As It Feels

This Exclusive Cayman Getaway Tastes As Good As It Feels

The post This Exclusive Cayman Getaway Tastes As Good As It Feels appeared on BitcoinEthereumNews.com. 1OAK’s Sand Soleil sits on Grand Cayman’s iconic Seven Mile Beach 1OAK Exhausted and professionally burnt out, I arrived at 1OAK’s Sand Soleil in search of the type of restoration that could still my mind and get me writing again. The seven-day culinary experience was a no-brainer for me as a food writer. The integration of an epicurean getaway with pure Cayman luxury seemed to be the perfect spark for my creativity—private chef dinners, deep dives into Caribbean flavors, and hands-on masterclasses, all located within a serene, oceanfront villa. I had finally arrived. With the last rays of the sun setting behind Grand Cayman’s famous Seven Mile Beach, casting a warm golden glow across the water, I tasted Chef Joe Hughes’ ceviche for the first time—cubes of wahoo cured in lime, with charred pineapple and a subtle, nutty crunch. Chef Joe Hughes’ love for bright, Asian-inspired flavours came through in this wahoo tataki layered with Vietnamese herbs, ripe papaya and mango, cashew and cilantro, all brought together with a nuoc cham. Jamie Fortune Something softened. For the first time in months, I began to feel present. Sophia List, the brainchild of the 1OAK experience, heard me well. With an intuition honed by years of curating luxury, she matched me with what she called “a vision realized.” List told me Sand Soleil—like the other 1OAK homes on Seven Mile Beach and in West Bay—was created to feel like a real sanctuary. For her, it’s the laid-back alternative to a busy hotel, a place where you get privacy and elegance without any fuss. “We wanted to introduce the Cayman Islands to something truly special—an ultra-luxury experience that combines exquisite design, maximum privacy, and a sense of calm,” she shared as she guided me through the four-bedroom villa. “We are so excited to…
Share
BitcoinEthereumNews2025/12/06 14:01
How Pros Buy Bitcoin Dips With DCA Like Institutions

How Pros Buy Bitcoin Dips With DCA Like Institutions

The post How Pros Buy Bitcoin Dips With DCA Like Institutions appeared on BitcoinEthereumNews.com. “Buy every dip.” That’s the advice from Strike CEO Jack Mallers. According to Mallers, with quantitative tightening over and rate cuts and stimulus on the horizon, the great print is coming. The US can’t afford falling asset prices, he argues, which translates into a giant wall of liquidity ready to muscle in and prop prices up. While retail has latched onto terms like “buy the dip” and “dollar-cost averaging” (DCA) for buying at market lows or making regular purchases, these are really concepts borrowed from the pros like Samar Sen, the senior vice president and head of APAC at Talos, an institutional digital asset trading platform. He says that institutional traders have used these terms for decades to manage their entry points into the market and build exposure gradually, while avoiding emotional decision-making in volatile markets. Source: Jack Mallers Related: Cryptocurrency investment: The ultimate indicators for crypto trading How institutions buy the dip Treasury companies like Strategy and BitMine have become poster children for institutions buying the dip and dollar-cost averaging (DCA) at scale, steadfastly vacuuming up coins every chance they get. Strategy stacked another 130 Bitcoin (BTC) on Monday, while the insatiable Tom Lee scooped up $150 million of Ether (ETH) on Thursday, prompting Arkham to post, “Tom Lee is DCAing ETH.” But while it may look like the smart money is glued to the screen reacting to every market downturn, the reality is quite different. Institutions don’t use the retail vocabulary, Samar explains, but the underlying ideas of disciplined accumulation, opportunistic rebalancing and staying insulated from short-term noise are very much present in how they engage with assets like Bitcoin. The core difference, he points out, is in how they execute those ideas. While retail investors are prone to react to headlines and price charts, institutional desks rely…
Share
BitcoinEthereumNews2025/12/06 13:53