Cleartext Transmission of Sensitive Information Affecting ait-core package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-AITCORE-6969016
  • published22 May 2024
  • disclosed21 May 2024
  • creditAndy Olchawa, Milenko Starcik

Introduced: 21 May 2024

CVE-2024-35061  (opens in a new tab)
CWE-319  (opens in a new tab)

How to fix?

There is no fixed version for ait-core.

Overview

ait-core is a NASA JPL's Ground Data System toolkit for Instrument and CubeSat Missions

Affected versions of this package are vulnerable to Cleartext Transmission of Sensitive Information due to the use of unencrypted channels to exchange data over the network. An attacker can execute arbitrary code by performing a man-in-the-middle attack.

Notes:

In the exploitation scenario, there two vulnerabilities:

  1. ZMQ communication is unencrypted.

  2. Use of Pickle

To prevent the RCE, it is recommended to resolve both issues. Although replacing the plain ZMQ communication with ZMQ SSH Tunnelling might be tempting, more is needed. It will mitigate the MitM attacks; however, given that the TLM instrument opens a port and connects to a telemetry source without any verification, another attack vector emerges for exploitation – in case the bad actor can access the telemetry source host, they can stop a telemetry source and start their own with a malicious payload.

CVSS Scores

version 3.1