Company Details
nasa
46,373
6,831,578
3364
nasa.gov
0
NAS_4658716
In-progress

NASA - National Aeronautics and Space Administration Company CyberSecurity Posture
nasa.govFor more than 60 years, NASA has been breaking barriers to achieve the seemingly impossible—from walking on the Moon to pushing the boundaries of human spaceflight farther than ever before. We work in space and around the world in laboratories and wind tunnels, on airfields and in control rooms to explore some of life’s fundamental mysteries: What’s out there in space? How do we get there? And what can we learn that will make life better here on Earth? We are passionate professionals united by a common purpose: to pioneer the future in space exploration, scientific discovery and aeronautics research. Today, we continue NASA’s legacy of excellence and innovation through an unprecedented array of missions. We are developing the most advanced rockets and spacecraft ever designed, studying the Earth for answers to critical challenges facing our planet, improving the air transportation experience, and so much more. Join us as we reach for new heights and reveal the unknown for the benefit of humanity.
Company Details
nasa
46,373
6,831,578
3364
nasa.gov
0
NAS_4658716
In-progress
Between 750 and 799

NNASA Global Score (TPRM)XXXX

Description: A small but persistent air leak in a Russian compartment of the International Space Station has prompted NASA and Axiom Space to indefinitely delay the launch of a commercial flight to the orbiting outpost. The flight was delayed due to high winds and an oxygen leak in the Falcon 9 rocket's first stage. NASA engineers needed more time to assess efforts to plug an air leak aboard the ISS in a Russian vestibule known as the PrK. The PrK serves as a passageway between the station's Zvezda module and spacecraft docked at its aft port.
Description: NASA’s computers were shut down for about 21 days by a young hacker in 1999. The hacker was able to gain access to 13 computers at the Marshall Space Flight Center and downloaded $1.7 million worth of NASA proprietary software. He was able to access thousands of messages, usernames, passwords, and source code for the International Space Station. The attack cost NASA a total of $41,000 to get systems back on track.
Description: The article highlights critical cybersecurity vulnerabilities in NASA’s **Artemis program**, particularly in the next-generation spacesuits and onboard systems of crewed spacecraft. The lack of cybersecurity specifications in spacesuit design proposals exposes missions to severe risks, including **malware or ransomware attacks** that could compromise life-support systems (e.g., air filters), steal proprietary/national secrets, or manipulate safety-critical operations. The integrated nature of spacecraft systems—where internal networks trust each other implicitly—amplifies threats, as malicious actors (crew, tourists, or external hackers) could exploit weak authentication to gain full control. Unlike terrestrial IT threats, space-based attacks could escalate to **life-or-death consequences** due to the unforgiving environment. The absence of modern safeguards like **zero-trust protocols** or ethical hacking frameworks further exacerbates risks, with potential for **catastrophic system failures** during missions. Experts warn that outdated 'security by obscurity' approaches are insufficient against evolving threats, including **ransomware-driven sabotage** or targeted attacks on crew safety.
Description: Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems. Security researcher Leon Juranić discovered stack-based buffer overflow vulnerabilities in NASA’s software, which could allow for remote code execution. These vulnerabilities were found in tools such as QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, and the knife library. Juranić also found reflected XSS vulnerabilities and hard-coded secret values in NASA’s web applications. State-sponsored threat actors could exploit these flaws to compromise NASA's systems and those of other institutions using the vulnerable software.


NASA - National Aeronautics and Space Administration has 257.14% more incidents than the average of same-industry companies with at least one recorded incident.
NASA - National Aeronautics and Space Administration has 207.69% more incidents than the average of all companies with at least one recorded incident.
NASA - National Aeronautics and Space Administration reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
NNASA cyber incidents detection timeline including parent company and subsidiaries

For more than 60 years, NASA has been breaking barriers to achieve the seemingly impossible—from walking on the Moon to pushing the boundaries of human spaceflight farther than ever before. We work in space and around the world in laboratories and wind tunnels, on airfields and in control rooms to explore some of life’s fundamental mysteries: What’s out there in space? How do we get there? And what can we learn that will make life better here on Earth? We are passionate professionals united by a common purpose: to pioneer the future in space exploration, scientific discovery and aeronautics research. Today, we continue NASA’s legacy of excellence and innovation through an unprecedented array of missions. We are developing the most advanced rockets and spacecraft ever designed, studying the Earth for answers to critical challenges facing our planet, improving the air transportation experience, and so much more. Join us as we reach for new heights and reveal the unknown for the benefit of humanity.

We are building a road to space for the benefit of Earth, humanity’s blue origin. Our team is focused on radically reducing the cost of access to space and harnessing its vast resources while mobilizing future generations to realize this mission. Blue Origin builds reusable rocket engines, launch ve
Pratt & Whitney, an RTX business, is a global leader in propulsion systems, powering the most advanced aircraft in the world, and we are shaping the future of aviation. Our engines help connect people, grow economies and defend freedom. Our customers depend on us to get where they’re going and back

Airbus pioneers sustainable aerospace for a safe and united world. The Company constantly innovates to provide efficient and technologically-advanced solutions in aerospace, defence, and connected services. In commercial aircraft, Airbus designs and manufactures modern and fuel-efficient airliners

B/E Aerospace is now part of Rockwell Collins. With the acquisition of B/E Aerospace in April 2017, Rockwell Collins is now a world leader in designing, developing and manufacturing cabin interior products and services that deliver innovation, reliability and efficiency. Our broad range of offeri

The FAA is on the leading edge of a new frontier in commercial space transportation, building the next generation (NextGen) of satellite-based navigation systems, and fostering the safe integration of unmanned aerial systems into our airspace. We can only dream of what the next 50 years of American

Bombardier is a global leader in aviation, focused on designing, manufacturing, and servicing the world's most exceptional business jets. Bombardier’s Challenger and Global aircraft families are renowned for their cutting-edge innovation, cabin design, performance, and reliability. Bombardier has a

At CAE, we equip people in critical roles with the expertise and solutions to create a safer world. As a technology company, we digitalize the physical world, deploying simulation training and critical operations support solutions. Above all else, we empower pilots, airlines, defence and security fo

SpaceX designs, manufactures and launches the world’s most advanced rockets and spacecraft. The company was founded in 2002 by Elon Musk to revolutionize space transportation, with the ultimate goal of making life multiplanetary. SpaceX has gained worldwide attention for a series of historic mil

A global aerospace company headquartered in Brazil, Embraer has businesses in Commercial and Executive Aviation, Defense & Security, and Agricultural Aviation. The company designs, develops, manufactures and markets aircraft and systems, providing Services and Support to customer after-sales. Sinc
.png)
TEMPO.CO, Jakarta - The United States' National Aeronautics and Space Administration (NASA) has officially banned Chinese nationals from...
NASA has barred Chinese nationals from accessing its premises and assets, even those who hold visas that permit them to reside in the USA.
NASA has blocked Chinese citizens with US visas from working on agency programs, people familiar with the matter said, as Washington...
Widowed by COVID-19, Pooja rebuilt life with Adani Cement's support. Today, her teenage son Vansh is honoured at one of the most prestigious...
A GAO report flags poor documentation, weak controls, and half-baked risk oversight as enduring threats to NASA's mission integrity.
Winning the space race drives NASA's $18.8B FY 2026 Discretionary Budget request and increases small business opportunities under realigned...
Following a review of the cybersecurity risk management at the National Aeronautics and Space Administration (NASA), the U.S. Government...
Challenges. Current day air traffic management systems are segmented by domain, operator groups, and solution provider groups, which creates...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of NASA - National Aeronautics and Space Administration is http://www.nasa.gov.
According to Rankiteo, NASA - National Aeronautics and Space Administration’s AI-generated cybersecurity score is 799, reflecting their Fair security posture.
According to Rankiteo, NASA - National Aeronautics and Space Administration currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, NASA - National Aeronautics and Space Administration is not certified under SOC 2 Type 1.
According to Rankiteo, NASA - National Aeronautics and Space Administration does not hold a SOC 2 Type 2 certification.
According to Rankiteo, NASA - National Aeronautics and Space Administration is not listed as GDPR compliant.
According to Rankiteo, NASA - National Aeronautics and Space Administration does not currently maintain PCI DSS compliance.
According to Rankiteo, NASA - National Aeronautics and Space Administration is not compliant with HIPAA regulations.
According to Rankiteo,NASA - National Aeronautics and Space Administration is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
NASA - National Aeronautics and Space Administration operates primarily in the Aviation and Aerospace Component Manufacturing industry.
NASA - National Aeronautics and Space Administration employs approximately 46,373 people worldwide.
NASA - National Aeronautics and Space Administration presently has no subsidiaries across any sectors.
NASA - National Aeronautics and Space Administration’s official LinkedIn profile has approximately 6,831,578 followers.
NASA - National Aeronautics and Space Administration is classified under the NAICS code 3364, which corresponds to Aerospace Product and Parts Manufacturing.
No, NASA - National Aeronautics and Space Administration does not have a profile on Crunchbase.
Yes, NASA - National Aeronautics and Space Administration maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nasa.
As of December 10, 2025, Rankiteo reports that NASA - National Aeronautics and Space Administration has experienced 4 cybersecurity incidents.
NASA - National Aeronautics and Space Administration has an estimated 2,675 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Cyber Attack and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $41 thousand.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with closing the hatch leading to the prk and the station's aft docking compartment during daily operations, and remediation measures with patching suspect crack and other possible sources of leakage, and remediation measures with proposed: zero-trust protocols for spacecraft systems, remediation measures with proposed: segmentation of safety-critical operations, remediation measures with proposed: malware scanning for passenger devices (space tsa equivalent), remediation measures with proposed: ethical hacking programs to identify vulnerabilities, and communication strategy with public disclosure via ieee aerospace conference paper, communication strategy with media coverage (e.g., ieee journal watch), communication strategy with calls for national/international policy changes, and network segmentation with proposed for future systems, and enhanced monitoring with proposed for crewed missions..
Title: NASA Cyber Attack by Hacker in 1999
Description: NASA’s computers were shut down for about 21 days by a young hacker in 1999. The hacker was able to gain access to 13 computers at the Marshall Space Flight Center and downloaded $1.7 million worth of NASA proprietary software. He was able to access thousands of messages, usernames, passwords, and source code for the International Space Station. The attack cost NASA a total of $41,000 to get systems back on track.
Type: Cyber Attack
Attack Vector: Unauthorized Access
Threat Actor: Young Hacker
Title: Vulnerabilities in NASA Open Source Software
Description: Vulnerabilities in open source software developed and used in-house by NASA were discovered by Leon Juranić, security researcher and founder of cybersecurity startup ThreatLeap. The vulnerabilities were found in tools such as QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, and the knife library. These vulnerabilities include stack-based buffer overflows, reflected cross site scripting (XSS), and hard-coded secret values, which could be exploited for remote code execution.
Type: Vulnerability Exploitation
Attack Vector: Exploitation of vulnerabilities in software
Vulnerability Exploited: Stack-based buffer overflowReflected cross site scripting (XSS)Hard-coded secret values
Threat Actor: Potential state-sponsored threat actors
Motivation: To compromise computer systems at NASA and other institutions using the vulnerable software
Title: Air Leak in Russian Compartment of the International Space Station
Description: Concern about a small but persistent air leak in a Russian compartment of the International Space Station has prompted NASA and Axiom Space to indefinitely delay this week's launch of a commercial flight to the orbiting outpost.
Date Detected: 2019
Type: Hardware Malfunction
Vulnerability Exploited: Aging hardware
Title: Potential Cybersecurity Vulnerabilities in Crewed Spacecraft Systems (Artemis Program and Beyond)
Description: A research paper presented at the 2023 IEEE Aerospace Conference highlights critical cybersecurity gaps in next-generation spacesuits and crewed spacecraft systems, including NASA's Artemis program. The study, led by Gregory Falco (Johns Hopkins), warns of risks such as malware/ransomware attacks via crew members (as attackers, vectors, collateral, or targets), theft of proprietary secrets, and sabotage of life-support systems. The lack of cybersecurity specifications in spacesuit designs and outdated 'security by obscurity' approaches are key concerns. Experts advocate for zero-trust protocols, ethical hacking, and space-specific security paradigms to mitigate risks in the high-stakes environment of human spaceflight.
Date Publicly Disclosed: 2023-03-00
Type: Research Warning
Attack Vector: Proximity-based malware/ransomware installation via crew membersExploitation of trusted internal spacecraft networks (lack of zero-trust)Compromised crew devices (e.g., space tourists' digital equipment)Sabotage of safety-critical systems (e.g., air filters, life support)Theft of proprietary/national secrets via insider threats
Vulnerability Exploited: Absence of cybersecurity specifications in Artemis spacesuit designs'Security by obscurity' (bespoke systems assumed secure due to complexity)Full-access trust model for onboard systemsLack of segmentation between safety-critical and non-critical operationsNo malware scanning for passenger devices (space tourism)
Threat Actor: State-sponsored actors (e.g., from space-dominant nations like U.S., China)Space tourists with malicious intentManipulated crew members (coerced or unwitting)Cybercriminals targeting ransomware opportunitiesInsider threats (crew as attackers)
Motivation: Espionage (theft of proprietary/national secrets)Financial gain (ransomware)Sabotage (disrupting missions or endangering crew)Geopolitical advantage in space raceProof-of-concept attacks (e.g., ethical hackers exposing flaws)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised crew/passenger devicesTrusted internal networks (lack of access controls)Physical proximity exploits (e.g., USB drives and maintenance ports).

Financial Loss: $41,000
Data Compromised: Messages, Usernames, Passwords, Source code for the international space station
Systems Affected: 13 computers at the Marshall Space Flight Center
Downtime: 21 days

Systems Affected: QuIPOpenVSPRHEASOMINASRefineCFDTOOLSknife library

Systems Affected: Russian compartment (PrK) of the ISSZvezda module
Downtime: Indefinite delay of Axiom-4 launch
Operational Impact: Delay in space missions

Data Compromised: Proprietary spacecraft designs, National security secrets, Crew personal data, Mission-critical operational data
Systems Affected: Next-generation spacesuits (Artemis program)Life-support systems (e.g., air filters)Onboard computer networksCommunication linksSafety-critical operational systems
Operational Impact: Potential mission failure or abortLoss of crew trust in systemsDelayed spaceflight programs (e.g., Artemis)Increased scrutiny from regulatory bodiesNeed for emergency protocol overhauls
Brand Reputation Impact: Erosion of public trust in space agencies (e.g., NASA)Negative perception of space tourism safetyPotential investor hesitation in commercial space ventures
Legal Liabilities: Violations of emerging space cybersecurity regulationsLiability for crew endangerment or fatalitiesInternational disputes over state-sponsored attacks
Identity Theft Risk: ['Crew personal data exposure']
Average Financial Loss: The average financial loss per incident is $10.25 thousand.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Proprietary Software, Messages, Usernames, Passwords, Source Code, , Hypothetical: Proprietary Spacecraft Data, Crew Personal Information, Mission Operational Data and .

Entity Name: NASA
Entity Type: Government Agency
Industry: Aerospace

Entity Name: NASA
Entity Type: Government Agency
Industry: Aerospace
Location: United States

Entity Name: NASA
Entity Type: Government Agency
Industry: Space Exploration
Location: Houston, Texas

Entity Name: Axiom Space
Entity Type: Private Company
Industry: Space Exploration

Entity Name: Roscosmos
Entity Type: Government Agency
Industry: Space Exploration
Location: Russia

Entity Name: NASA
Entity Type: Government Space Agency
Industry: Aerospace/Defense
Location: United States
Size: Large

Entity Name: Artemis Program
Entity Type: Spaceflight Mission
Industry: Space Exploration
Location: International (led by U.S.)

Entity Name: China National Space Administration (CNSA)
Entity Type: Government Space Agency
Industry: Aerospace/Defense
Location: China
Size: Large

Entity Name: Tiangong Space Station
Entity Type: Space Station
Industry: Space Exploration
Location: Low Earth Orbit (China-led)

Entity Name: Commercial Space Tourism Companies
Entity Type: Private Sector
Industry: Space Tourism
Location: Global
Size: Varies (Startups to Large)
Customers Affected: Potential space tourists

Containment Measures: Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations
Remediation Measures: Patching suspect crack and other possible sources of leakage

Remediation Measures: Proposed: Zero-trust protocols for spacecraft systemsProposed: Segmentation of safety-critical operationsProposed: Malware scanning for passenger devices (space TSA equivalent)Proposed: Ethical hacking programs to identify vulnerabilities
Communication Strategy: Public disclosure via IEEE Aerospace Conference paperMedia coverage (e.g., IEEE Journal Watch)Calls for national/international policy changes
Network Segmentation: ['Proposed for future systems']
Enhanced Monitoring: Proposed for crewed missions

Type of Data Compromised: Proprietary software, Messages, Usernames, Passwords, Source code
Sensitivity of Data: High

Type of Data Compromised: Hypothetical: proprietary spacecraft data, Crew personal information, Mission operational data
Sensitivity of Data: High (national security, crew safety)
Data Exfiltration: Hypothetical: Via compromised crew devices or internal networks
Personally Identifiable Information: Hypothetical: Crew/Passenger PII
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patching suspect crack and other possible sources of leakage, , Proposed: Zero-trust protocols for spacecraft systems, Proposed: Segmentation of safety-critical operations, Proposed: Malware scanning for passenger devices (space TSA equivalent), Proposed: Ethical hacking programs to identify vulnerabilities, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by closing the hatch leading to the prk and the station's aft docking compartment during daily operations and .

Data Encryption: ['Hypothetical: Safety-critical systems']
Data Exfiltration: ['Hypothetical: For double-extortion attacks']

Regulations Violated: Lack of compliance with emerging space cybersecurity standards,
Regulatory Notifications: Call for new national/international policies (e.g., via UW Space Law Program)

Lessons Learned: The importance of Secure Software Development Life Cycle (SDLC) practices, especially for government agencies and their contractors.

Lessons Learned: 'Security by obscurity' is insufficient for modern spacecraft, Crew members (including tourists) can be attack vectors, Zero-trust models are critical for life-support systems, Space cybersecurity requires bespoke solutions (not terrestrial copy-paste), Ethical hacking and red-teaming are underutilized in aerospace, Policy gaps exist at national and international levels

Recommendations: Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy.

Recommendations: Mandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awarenessMandate cybersecurity specifications in spacesuit/spacecraft RFPs, Adopt zero-trust architecture for all onboard systems, Implement segmentation between critical and non-critical operations, Establish a 'space TSA' to scan passenger devices for malware, Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Foster ethical hacking programs with legal protections for researchers, Create national legislation for space cybersecurity (U.S., China, etc.), Enhance international dialogue on space cyber threats, Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awareness
Key Lessons Learned: The key lessons learned from past incidents are The importance of Secure Software Development Life Cycle (SDLC) practices, especially for government agencies and their contractors.'Security by obscurity' is insufficient for modern spacecraft,Crew members (including tourists) can be attack vectors,Zero-trust models are critical for life-support systems,Space cybersecurity requires bespoke solutions (not terrestrial copy-paste),Ethical hacking and red-teaming are underutilized in aerospace,Policy gaps exist at national and international levels.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy..

Source: Cyber Incident Description

Source: Help Net Security

Source: CBS News/NASA

Source: IEEE Aerospace Conference 2023 Paper
Date Accessed: 2023-03-00

Source: IEEE Journal Watch (Partnership with IEEE Xplore)
Date Accessed: 2023-07-00

Source: 2019 IEEE Aerospace and Electronic Systems Review Paper (Satellite Cybersecurity)

Source: 2021 NASA Report on Cyber Incidents
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Description, and Source: Help Net Security, and Source: CBS News/NASA, and Source: IEEE Aerospace Conference 2023 PaperDate Accessed: 2023-03-00, and Source: IEEE Journal Watch (Partnership with IEEE Xplore)Date Accessed: 2023-07-00, and Source: 2019 IEEE Aerospace and Electronic Systems Review Paper (Satellite Cybersecurity), and Source: 2021 NASA Report on Cyber Incidents.

Investigation Status: Ongoing

Investigation Status: Ongoing Research/Advocacy (No active incident; theoretical analysis)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure Via Ieee Aerospace Conference Paper, Media Coverage (E.G., Ieee Journal Watch) and Calls For National/International Policy Changes.

Stakeholder Advisories: Space Agencies (Nasa, Cnsa, Esa, Etc.), Commercial Spaceflight Companies (E.G., Spacex, Blue Origin), Space Tourism Operators, National Legislatures (E.G., U.S. Congress, China'S Npc), International Bodies (E.G., Un Office For Outer Space Affairs), Aerospace Industry Standards Organizations (E.G., Ieee, Iso).
Customer Advisories: Future Artemis crew membersSpace touristsAstronauts on Tiangong Space StationCommercial spaceflight passengers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Space Agencies (Nasa, Cnsa, Esa, Etc.), Commercial Spaceflight Companies (E.G., Spacex, Blue Origin), Space Tourism Operators, National Legislatures (E.G., U.S. Congress, China'S Npc), International Bodies (E.G., Un Office For Outer Space Affairs), Aerospace Industry Standards Organizations (E.G., Ieee, Iso), Future Artemis Crew Members, Space Tourists, Astronauts On Tiangong Space Station, Commercial Spaceflight Passengers and .

Entry Point: Compromised Crew/Passenger Devices, Trusted Internal Networks (Lack Of Access Controls), Physical Proximity Exploits (E.G., Usb Drives, Maintenance Ports),
Backdoors Established: ['Hypothetical: Persistent access via spacesuit or life-support systems']
High Value Targets: Mission-Critical Operational Data, Life-Support System Controls, Propulsion/Navigation Systems, Crew Communication Channels,
Data Sold on Dark Web: Mission-Critical Operational Data, Life-Support System Controls, Propulsion/Navigation Systems, Crew Communication Channels,

Root Causes: High Cyclic Fatigue Caused By Micro Vibrations, Pressure And Mechanical Stress, Residual Stress, Material Properties, Environmental Exposures,

Root Causes: Lack Of Cybersecurity Requirements In Procurement (E.G., Artemis Spacesuits), Over-Reliance On 'Security By Obscurity', Absence Of Zero-Trust Models In Spacecraft Design, No Standardized Cybersecurity Frameworks For Space Systems, Insufficient Red-Teaming/Ethical Hacking In Aerospace, Policy Gaps At National/International Levels,
Corrective Actions: Update Nasa/Cnsa Cybersecurity Policies For Crewed Missions, Integrate Zero-Trust And Segmentation Into Spacecraft Architecture, Fund R&D For Space-Specific Security Solutions, Establish Legal Frameworks For Ethical Hacking In Aerospace, Develop 'Space Tsa' Protocols For Passenger Device Screening, Enhance Crew Training On Cyber Threats, Create International Norms For Space Cybersecurity (Via Un Or Bilateral Agreements),
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Proposed For Crewed Missions, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Update Nasa/Cnsa Cybersecurity Policies For Crewed Missions, Integrate Zero-Trust And Segmentation Into Spacecraft Architecture, Fund R&D For Space-Specific Security Solutions, Establish Legal Frameworks For Ethical Hacking In Aerospace, Develop 'Space Tsa' Protocols For Passenger Device Screening, Enhance Crew Training On Cyber Threats, Create International Norms For Space Cybersecurity (Via Un Or Bilateral Agreements), .
Last Attacking Group: The attacking group in the last incident were an Young Hacker, Potential state-sponsored threat actors, State-sponsored actors (e.g., from space-dominant nations like U.S. and China)Space tourists with malicious intentManipulated crew members (coerced or unwitting)Cybercriminals targeting ransomware opportunitiesInsider threats (crew as attackers).
Most Recent Incident Detected: The most recent incident detected was on 2019.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-03-00.
Highest Financial Loss: The highest financial loss from an incident was $41,000.
Most Significant Data Compromised: The most significant data compromised in an incident were messages, usernames, passwords, source code for the International Space Station, , Proprietary spacecraft designs, National security secrets, Crew personal data, Mission-critical operational data and .
Most Significant System Affected: The most significant system affected in an incident were 13 computers at the Marshall Space Flight Center and QuIPOpenVSPRHEASOMINASRefineCFDTOOLSknife library and Russian compartment (PrK) of the ISSZvezda module and Next-generation spacesuits (Artemis program)Life-support systems (e.g., air filters)Onboard computer networksCommunication linksSafety-critical operational systems.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were passwords, source code for the International Space Station, Mission-critical operational data, National security secrets, Crew personal data, usernames, Proprietary spacecraft designs and messages.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Policy gaps exist at national and international levels.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Develop space-specific cybersecurity standards (e.g., via IEEE, ISO), Mandate cybersecurity specifications in spacesuit/spacecraft RFPs, Create national legislation for space cybersecurity (U.S., China, etc.), Invest in R&D for novel security paradigms (e.g., AI-driven anomaly detection), Prioritize crew training on cyber hygiene and insider threat awareness, Enhance international dialogue on space cyber threats, Adopt zero-trust architecture for all onboard systems, Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy., Foster ethical hacking programs with legal protections for researchers, Establish a 'space TSA' to scan passenger devices for malware and Implement segmentation between critical and non-critical operations.
Most Recent Source: The most recent source of information about an incident are 2021 NASA Report on Cyber Incidents, CBS News/NASA, Cyber Incident Description, IEEE Aerospace Conference 2023 Paper, Help Net Security, 2019 IEEE Aerospace and Electronic Systems Review Paper (Satellite Cybersecurity) and IEEE Journal Watch (Partnership with IEEE Xplore).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Space agencies (NASA, CNSA, ESA, etc.), Commercial spaceflight companies (e.g., SpaceX, Blue Origin), Space tourism operators, National legislatures (e.g., U.S. Congress, China's NPC), International bodies (e.g., UN Office for Outer Space Affairs), Aerospace industry standards organizations (e.g., IEEE, ISO), .
Most Recent Customer Advisory: The most recent customer advisory issued was an Future Artemis crew membersSpace touristsAstronauts on Tiangong Space StationCommercial spaceflight passengers.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was High cyclic fatigue caused by micro vibrationsPressure and mechanical stressResidual stressMaterial propertiesEnvironmental exposures, Lack of cybersecurity requirements in procurement (e.g., Artemis spacesuits)Over-reliance on 'security by obscurity'Absence of zero-trust models in spacecraft designNo standardized cybersecurity frameworks for space systemsInsufficient red-teaming/ethical hacking in aerospacePolicy gaps at national/international levels.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Update NASA/CNSA cybersecurity policies for crewed missionsIntegrate zero-trust and segmentation into spacecraft architectureFund R&D for space-specific security solutionsEstablish legal frameworks for ethical hacking in aerospaceDevelop 'space TSA' protocols for passenger device screeningEnhance crew training on cyber threatsCreate international norms for space cybersecurity (via UN or bilateral agreements).
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.