

Communications between Earth and NASA spacecraft were critically vulnerable to hacking for years until an AI found the flaw and fixed it in just four days.
The vulnerability was sniffed out by an AI cybersecurity algorithm developed by California-based start-up AISLE and resides in the CryptoLib security software that protects spacecraft-to-ground communications. The vulnerability could have enabled hackers to seize control over countless space missions including NASA’s Mars rovers, according to the cybersecurity researchers.
The researchers said the vulnerability was found in the authentication system and could have been exploited through compromised operator credentials. For example, the attackers could have gained access to user names and passwords of NASA employees through social engineering, methods such as phishing or infecting computers with viruses uploaded to USB drives and left where personnel could find them.
“The vulnerability transforms what should be routine authentication configuration into a weapon,” the researchers wrote. “An attacker … can inject arbitrary commands that execute with full system privileges.”
In other words, an attacker could remotely hijack the spacecraft or just intercept the data it is exchanging with ground control.
Fortunately, to gain access to the spacecraft through the CryptoLib vulnerability would require the attackers to, at some point, have local access to the system, which “reduces the attack surface compared to a remotely exploitable flaw,” the researchers said in the blog post.
The researchers said that the vulnerability survived in the authentication software despite multiple human reviews of the code over the three years it existed. AISLE’s AI-powered “autonomous analyzer” discovered and helped fix the problem in four days, highlighting the potential these tools have in terms of detecting cybersecurity vulnerabilities.
“Automated analysis tools are becoming essential,” the researchers wrote. “Human review remains valuable, but autonomous analyzers can systematically examine entire codebases, flag suspicious patterns, and operate continuously as code evolves.”




