NASA - National Aeronautics and Space Administration Company Cyber Security Posture

nasa.gov

For more than 60 years, NASA has been breaking barriers to achieve the seemingly impossibleโ€”from walking on the Moon to pushing the boundaries of human spaceflight farther than ever before. We work in space and around the world in laboratories and wind tunnels, on airfields and in control rooms to explore some of lifeโ€™s fundamental mysteries: Whatโ€™s out there in space? How do we get there? And what can we learn that will make life better here on Earth? We are passionate professionals united by a common purpose: to pioneer the future in space exploration, scientific discovery and aeronautics research. Today, we continue NASAโ€™s legacy of excellence and innovation through an unprecedented array of missions. We are developing the most advanced rockets and spacecraft ever designed, studying the Earth for answers to critical challenges facing our planet, improving the air transportation experience, and so much more. Join us as we reach for new heights and reveal the unknown for the benefit of humanity.

N-NASA Company Details

Linkedin ID:

nasa

Employees number:

47729 employees

Number of followers:

6722214.0

NAICS:

336

Industry Type:

Aviation and Aerospace Component Manufacturing

Homepage:

nasa.gov

IP Addresses:

Scan still pending

Company ID:

NAS_4658716

Scan Status:

In-progress

AI scoreN-NASA Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreN-NASA Global Score
blurone
Ailogo

NASA - National Aeronautics and Space Administration Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

NASA - National Aeronautics and Space Administration Company Cyber Security News & History

Past Incidents
3
Attack Types
3
EntityTypeSeverityImpactSeenUrl IDDetailsView
NASA - National Aeronautics and Space AdministrationCyber Attack100501/1999NAS214223222Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: NASAโ€™s computers were shut down for about 21 days by a young hacker in 1999. The hacker was able to gain access to 13 computers at the Marshall Space Flight Center and downloaded $1.7 million worth of NASA proprietary software. He was able to access thousands of messages, usernames, passwords, and source code for the International Space Station. The attack cost NASA a total of $41,000 to get systems back on track.

NASAVulnerability2515/2025NAS829052725Link
Rankiteo Explanation :
Attack without any consequences

Description: Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems. Security researcher Leon Juraniฤ‡ discovered stack-based buffer overflow vulnerabilities in NASAโ€™s software, which could allow for remote code execution. These vulnerabilities were found in tools such as QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, and the knife library. Juraniฤ‡ also found reflected XSS vulnerabilities and hard-coded secret values in NASAโ€™s web applications. State-sponsored threat actors could exploit these flaws to compromise NASA's systems and those of other institutions using the vulnerable software.

NASABreach1006/2025NAS449061725Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: A small but persistent air leak in a Russian compartment of the International Space Station has prompted NASA and Axiom Space to indefinitely delay the launch of a commercial flight to the orbiting outpost. The flight was delayed due to high winds and an oxygen leak in the Falcon 9 rocket's first stage. NASA engineers needed more time to assess efforts to plug an air leak aboard the ISS in a Russian vestibule known as the PrK. The PrK serves as a passageway between the station's Zvezda module and spacecraft docked at its aft port.

NASA - National Aeronautics and Space Administration Company Subsidiaries

SubsidiaryImage

For more than 60 years, NASA has been breaking barriers to achieve the seemingly impossibleโ€”from walking on the Moon to pushing the boundaries of human spaceflight farther than ever before. We work in space and around the world in laboratories and wind tunnels, on airfields and in control rooms to explore some of lifeโ€™s fundamental mysteries: Whatโ€™s out there in space? How do we get there? And what can we learn that will make life better here on Earth? We are passionate professionals united by a common purpose: to pioneer the future in space exploration, scientific discovery and aeronautics research. Today, we continue NASAโ€™s legacy of excellence and innovation through an unprecedented array of missions. We are developing the most advanced rockets and spacecraft ever designed, studying the Earth for answers to critical challenges facing our planet, improving the air transportation experience, and so much more. Join us as we reach for new heights and reveal the unknown for the benefit of humanity.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=nasa' -H 'apikey: YOUR_API_KEY_HERE'
newsone

N-NASA Cyber Security News

2025-06-27T07:00:00.000Z
GAO finds NASAโ€™s cyber risk practices inadequate, raising concerns over space project security and risk management

GAO reviewed NASA's policies and guidance regarding cybersecurity risk management. GAO selected a non-generalizable sample of two major projectsย ...

2025-07-06T23:31:45.000Z
NASA has half-baked risk management for cybersecurity, scathing report finds

A GAO report flags poor documentation, weak controls, and half-baked risk oversight as enduring threats to NASA's mission integrity.

2025-06-30T20:40:11.000Z
The Wrap: SSAโ€™s Fourth CIO a Charm?; NASA Cyber Gaps; DIB Firms Take Warning

The Social Security Administration's Trump2-era revolving door for chief information officers keeps spinning like a top. The agency hasย ...

2025-04-13T07:00:00.000Z
Space ISAC, NASA sign agreement to strengthen space security collaboration

The partnership is intended to promote the exchange of information on a range of space security challenges, including space weather,ย ...

2024-08-30T07:00:00.000Z
NASA Focuses on Cybersecurity of Its Mission-Critical Software

The National Aeronautics and Space Administration is increasingly considering cybersecurity when evaluating software projects in order toย ...

2024-10-24T07:00:00.000Z
Penn State Settles for $1.25M Over Failure to Comply With DoD, NASA Cybersecurity Requirements

The qui tam action alleges that Penn State, which solicits and receives research contracts from federal agencies, failed to comply with theย ...

2025-01-07T08:00:00.000Z
DoD, GSA, NASA unite to boost cybersecurity workforce standards in FAR alignment with EO 13870

It is a fundamental resource in developing and supporting a prepared and effective cybersecurity workforce that enables consistentย ...

2024-10-23T07:00:00.000Z
Penn State fined $1.25 million for failing to meet cyber requirements in federal contracts

The school was accused of failing to implement cybersecurity controls between 2018 and 2023, and after acknowledging the issues it allegedlyย ...

2024-09-18T07:00:00.000Z
Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military

A Chinese national has been indicted in the U.S. on charges of conducting a "multi-year" spear-phishing campaign to obtain unauthorizedย ...

similarCompanies

N-NASA Similar Companies

Airbus Helicopters

Airbus is a leader in designing, manufacturing and delivering aerospace products, services and solutions to customers on a worldwide scale. Airbus strives to provide the most efficient helicopter solutions to its customers who serve, protect, save lives and safely carry passengers in demanding envi

SpaceX

SpaceX designs, manufactures and launches the worldโ€™s most advanced rockets and spacecraft. The company was founded in 2002 by Elon Musk to revolutionize space transportation, with the ultimate goal of making life multiplanetary. SpaceX has gained worldwide attention for a series of historic mil

Flight Refuelling Ltd

Key Facts We have a deep understanding of how our equipment will be used and never lose sight of whatโ€™s important to our customers. This insight enables us to design and manufacture products that have the critical functionality customers want and reduce the logistical burden for platforms that

Space Generation Advisory Council

The Space Generation Advisory Council in support of the United Nations Programme on Space Application (SGAC) is a non-governmental organisation which aims to represent students and young space professionals to the United Nations, States, and space agencies. SGAC has permanent observer status in the

Dassault Aviation

Dassault Aviation is a French aerospace company that shapes the future by designing and building military aircraft, business jets and space systems. Leader on the New Generation Fighter developed within the joint European program FCAS (Future Combat Air System) Designer and manufacturer of the Raf

Pratt & Whitney

Pratt & Whitney, an RTX business, is a global leader in propulsion systems, powering the most advanced aircraft in the world, and we are shaping the future of aviation. Our engines help connect people, grow economies and defend freedom. Our customers depend on us to get where theyโ€™re going and back

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

N-NASA CyberSecurity History Information

How many cyber incidents has N-NASA faced?

Total Incidents: According to Rankiteo, N-NASA has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at N-NASA?

Incident Types: The types of cybersecurity incidents that have occurred incidents Cyber Attack, Vulnerability and Breach.

What was the total financial impact of these incidents on N-NASA?

Total Financial Loss: The total financial loss from these incidents is estimated to be $41 thousand.

How does N-NASA detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations and remediation measures with Patching suspect crack and other possible sources of leakage.

Incident Details

Can you provide details on each incident?

Incident : Hardware Malfunction

Title: Air Leak in Russian Compartment of the International Space Station

Description: Concern about a small but persistent air leak in a Russian compartment of the International Space Station has prompted NASA and Axiom Space to indefinitely delay this week's launch of a commercial flight to the orbiting outpost.

Date Detected: 2019

Type: Hardware Malfunction

Vulnerability Exploited: Aging hardware

Incident : Vulnerability Exploitation

Title: Vulnerabilities in NASA Open Source Software

Description: Vulnerabilities in open source software developed and used in-house by NASA were discovered by Leon Juraniฤ‡, security researcher and founder of cybersecurity startup ThreatLeap. The vulnerabilities were found in tools such as QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, and the knife library. These vulnerabilities include stack-based buffer overflows, reflected cross site scripting (XSS), and hard-coded secret values, which could be exploited for remote code execution.

Type: Vulnerability Exploitation

Attack Vector: Exploitation of vulnerabilities in software

Vulnerability Exploited: Stack-based buffer overflow, Reflected cross site scripting (XSS), Hard-coded secret values

Threat Actor: Potential state-sponsored threat actors

Motivation: To compromise computer systems at NASA and other institutions using the vulnerable software

Incident : Cyber Attack

Title: NASA Cyber Attack by Hacker in 1999

Description: NASAโ€™s computers were shut down for about 21 days by a young hacker in 1999. The hacker was able to gain access to 13 computers at the Marshall Space Flight Center and downloaded $1.7 million worth of NASA proprietary software. He was able to access thousands of messages, usernames, passwords, and source code for the International Space Station. The attack cost NASA a total of $41,000 to get systems back on track.

Type: Cyber Attack

Attack Vector: Unauthorized Access

Threat Actor: Young Hacker

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident?

Incident : Hardware Malfunction NAS449061725

Systems Affected: Russian compartment (PrK) of the ISS, Zvezda module

Downtime: Indefinite delay of Axiom-4 launch

Operational Impact: Delay in space missions

Incident : Vulnerability Exploitation NAS829052725

Systems Affected: QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, knife library

Incident : Cyber Attack NAS214223222

Financial Loss: $41,000

Data Compromised: messages, usernames, passwords, source code for the International Space Station

Systems Affected: 13 computers at the Marshall Space Flight Center

Downtime: 21 days

What is the average financial loss per incident?

Average Financial Loss: The average financial loss per incident is $13.67 thousand.

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are proprietary software, messages, usernames, passwords and source code.

Which entities were affected by each incident?

Incident : Hardware Malfunction NAS449061725

Entity Type: Government Agency

Industry: Space Exploration

Location: Houston, Texas

Incident : Hardware Malfunction NAS449061725

Entity Type: Private Company

Industry: Space Exploration

Incident : Hardware Malfunction NAS449061725

Entity Type: Government Agency

Industry: Space Exploration

Location: Russia

Incident : Vulnerability Exploitation NAS829052725

Entity Type: Government Agency

Industry: Aerospace

Location: United States

Incident : Cyber Attack NAS214223222

Entity Type: Government Agency

Industry: Aerospace

Response to the Incidents

What measures were taken in response to each incident?

Incident : Hardware Malfunction NAS449061725

Containment Measures: Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations

Remediation Measures: Patching suspect crack and other possible sources of leakage

Data Breach Information

What type of data was compromised in each breach?

Incident : Cyber Attack NAS214223222

Type of Data Compromised: proprietary software, messages, usernames, passwords, source code

Sensitivity of Data: High

Data Exfiltration: True

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patching suspect crack and other possible sources of leakage.

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations.

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Vulnerability Exploitation NAS829052725

Lessons Learned: The importance of Secure Software Development Life Cycle (SDLC) practices, especially for government agencies and their contractors.

What recommendations were made to prevent future incidents?

Incident : Vulnerability Exploitation NAS829052725

Recommendations: Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are The importance of Secure Software Development Life Cycle (SDLC) practices, especially for government agencies and their contractors.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy..

References

Where can I find more information about each incident?

Incident : Hardware Malfunction NAS449061725

Source: CBS News/NASA

Incident : Vulnerability Exploitation NAS829052725

Source: Help Net Security

Incident : Cyber Attack NAS214223222

Source: Cyber Incident Description

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CBS News/NASA, and Source: Help Net Security, and Source: Cyber Incident Description.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Hardware Malfunction NAS449061725

Investigation Status: Ongoing

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Hardware Malfunction NAS449061725

Root Causes: High cyclic fatigue caused by micro vibrations, Pressure and mechanical stress, Residual stress, Material properties, Environmental exposures

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Potential state-sponsored threat actors and Young Hacker.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2019.

Impact of the Incidents

What was the highest financial loss from an incident?

Highest Financial Loss: The highest financial loss from an incident was $41,000.

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were messages, usernames, passwords and source code for the International Space Station.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Russian compartment (PrK) of the ISS, Zvezda module and QuIP, OpenVSP, RHEAS, OMINAS, Refine, CFDTOOLS, knife library and 13 computers at the Marshall Space Flight Center.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Closing the hatch leading to the PrK and the station's aft docking compartment during daily operations.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were messages, usernames, passwords and source code for the International Space Station.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was The importance of Secure Software Development Life Cycle (SDLC) practices, especially for government agencies and their contractors.

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Improvement in NASA's software security processes and NASA's SRA (Software Release Authority) policy..

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are CBS News/NASA, Help Net Security and Cyber Incident Description.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge