CVE-2024-26369: n/a
An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data.
AI Analysis
Technical Summary
CVE-2024-26369 is a vulnerability identified in the HistoryQosPolicy component of FastDDS, an open-source implementation of the Data Distribution Service (DDS) protocol widely used for real-time data exchange in distributed systems. The affected versions include 2.6.x, 2.10.x, 2.11.x, and 2.12.x. The flaw manifests as a SIGABRT signal triggered upon receiving data from a DataWriter, which causes the FastDDS process to abort unexpectedly. This behavior indicates a denial of service condition where the application crashes, potentially disrupting communication between distributed components. The vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption or denial of service. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is rated high, suggesting that the vulnerability could lead to exposure or leakage of sensitive data during the crash or through side effects, although integrity and availability impacts are not explicitly noted beyond the denial of service. No patches or known exploits are currently reported, but the vulnerability's nature makes it a significant risk for systems relying on FastDDS for critical real-time communication, such as autonomous vehicles, industrial automation, and defense applications.
Potential Impact
The primary impact of CVE-2024-26369 is denial of service caused by unexpected process termination (SIGABRT) in FastDDS applications. This can disrupt real-time data exchange in distributed systems, leading to operational downtime, loss of data continuity, and potential safety risks in critical environments like automotive, aerospace, and industrial control systems. The high confidentiality impact suggests that sensitive data might be exposed or improperly handled during the crash, increasing the risk of information leakage. Organizations relying on FastDDS for mission-critical communication may experience degraded system reliability and increased operational costs due to system restarts and troubleshooting. The lack of required privileges or user interaction for exploitation means attackers can remotely trigger the vulnerability, increasing the attack surface and risk of widespread disruption. Although no known exploits exist yet, the vulnerability's characteristics make it a likely target for attackers aiming to cause service outages or gather sensitive information by exploiting the crash behavior.
Mitigation Recommendations
1. Restrict network access to FastDDS endpoints by implementing strict firewall rules and network segmentation to limit exposure to untrusted sources. 2. Monitor FastDDS processes for abnormal terminations and implement automated restart mechanisms to minimize downtime. 3. Employ application-layer filtering or validation to detect and block malformed or suspicious DataWriter messages that could trigger the SIGABRT. 4. Engage with the FastDDS community or vendor for updates and patches addressing this vulnerability as they become available. 5. Conduct thorough testing of FastDDS deployments under load and malformed input conditions to identify and mitigate potential crash triggers. 6. Where possible, isolate critical FastDDS components in hardened environments with minimal external exposure. 7. Implement logging and alerting for unusual network activity or process crashes to enable rapid incident response. 8. Consider alternative DDS implementations or versions not affected by this vulnerability if immediate patching is not feasible.
Affected Countries
United States, Germany, Japan, South Korea, France, United Kingdom, China, Canada, Italy, Australia
CVE-2024-26369: n/a
Description
An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-26369 is a vulnerability identified in the HistoryQosPolicy component of FastDDS, an open-source implementation of the Data Distribution Service (DDS) protocol widely used for real-time data exchange in distributed systems. The affected versions include 2.6.x, 2.10.x, 2.11.x, and 2.12.x. The flaw manifests as a SIGABRT signal triggered upon receiving data from a DataWriter, which causes the FastDDS process to abort unexpectedly. This behavior indicates a denial of service condition where the application crashes, potentially disrupting communication between distributed components. The vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption or denial of service. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is rated high, suggesting that the vulnerability could lead to exposure or leakage of sensitive data during the crash or through side effects, although integrity and availability impacts are not explicitly noted beyond the denial of service. No patches or known exploits are currently reported, but the vulnerability's nature makes it a significant risk for systems relying on FastDDS for critical real-time communication, such as autonomous vehicles, industrial automation, and defense applications.
Potential Impact
The primary impact of CVE-2024-26369 is denial of service caused by unexpected process termination (SIGABRT) in FastDDS applications. This can disrupt real-time data exchange in distributed systems, leading to operational downtime, loss of data continuity, and potential safety risks in critical environments like automotive, aerospace, and industrial control systems. The high confidentiality impact suggests that sensitive data might be exposed or improperly handled during the crash, increasing the risk of information leakage. Organizations relying on FastDDS for mission-critical communication may experience degraded system reliability and increased operational costs due to system restarts and troubleshooting. The lack of required privileges or user interaction for exploitation means attackers can remotely trigger the vulnerability, increasing the attack surface and risk of widespread disruption. Although no known exploits exist yet, the vulnerability's characteristics make it a likely target for attackers aiming to cause service outages or gather sensitive information by exploiting the crash behavior.
Mitigation Recommendations
1. Restrict network access to FastDDS endpoints by implementing strict firewall rules and network segmentation to limit exposure to untrusted sources. 2. Monitor FastDDS processes for abnormal terminations and implement automated restart mechanisms to minimize downtime. 3. Employ application-layer filtering or validation to detect and block malformed or suspicious DataWriter messages that could trigger the SIGABRT. 4. Engage with the FastDDS community or vendor for updates and patches addressing this vulnerability as they become available. 5. Conduct thorough testing of FastDDS deployments under load and malformed input conditions to identify and mitigate potential crash triggers. 6. Where possible, isolate critical FastDDS components in hardened environments with minimal external exposure. 7. Implement logging and alerting for unusual network activity or process crashes to enable rapid incident response. 8. Consider alternative DDS implementations or versions not affected by this vulnerability if immediate patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d75b7ef31ef0b57258a
Added to database: 2/25/2026, 9:45:25 PM
Last enriched: 2/26/2026, 10:53:35 AM
Last updated: 4/12/2026, 1:57:16 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.