Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62599: CWE-190 Integer Overflow or Wraparound in eProsima Fast-DDS

0
Low
VulnerabilityCVE-2025-62599cvecve-2025-62599cwe-190cwe-125
Published: Tue Feb 03 2026 (02/03/2026, 17:54:49 UTC)
Source: CVE Database V5
Vendor/Project: eProsima
Product: Fast-DDS

Description

CVE-2025-62599 is an integer overflow vulnerability in eProsima Fast-DDS prior to versions 3. 4. 1, 3. 3. 1, and 2. 6. 11. When security mode is enabled, specially crafted SPDP packets with modified DATA Submessages can cause an integer overflow in the length field of certain tokens, leading to an out-of-memory (OOM) condition and remote termination of the Fast-DDS process. This vulnerability requires no authentication or user interaction and can be triggered remotely over the network. The CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:51:00 UTC

Technical Analysis

CVE-2025-62599 identifies an integer overflow vulnerability in the eProsima Fast-DDS library, a C++ implementation of the OMG Data Distribution Service standard used for real-time distributed systems communication. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, an attacker can craft a malicious SPDP (Simple Participant Discovery Protocol) packet containing a DATA Submessage with tampered PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN fields. By manipulating the length field within the readPropertySeq sequence, an integer overflow occurs during a resize operation, causing the system to allocate an incorrect amount of memory. This leads to an out-of-memory condition that crashes the Fast-DDS process remotely, resulting in a denial-of-service (DoS). The vulnerability does not require authentication or user interaction and can be exploited over the network, but the impact is limited to process termination without further code execution or data compromise. The vulnerability is tracked under CWE-190 (Integer Overflow or Wraparound) and CWE-125 (Out-of-bounds Read). Although no exploits are known in the wild, the issue is addressed in the patched versions 3.4.1, 3.3.1, and 2.6.11. The CVSS 4.0 base score of 1.7 reflects the low severity due to limited impact and exploitation complexity.

Potential Impact

For European organizations, the primary impact of CVE-2025-62599 is a potential denial-of-service condition in systems using vulnerable versions of Fast-DDS with security mode enabled. This can disrupt real-time communication in distributed applications such as industrial automation, automotive systems, robotics, and critical infrastructure monitoring, where Fast-DDS is commonly deployed. The out-of-memory crash can cause service interruptions, potentially leading to operational downtime and safety risks in time-sensitive environments. Although no data confidentiality or integrity loss is indicated, availability degradation can have significant consequences in sectors relying on continuous and reliable data distribution. The low CVSS score suggests limited risk for widespread exploitation, but targeted attacks against critical systems could still cause localized disruption. European industries with extensive use of DDS-based middleware, especially in Germany, France, Italy, and the Nordic countries, may face higher exposure due to their advanced manufacturing and automotive sectors.

Mitigation Recommendations

1. Upgrade all Fast-DDS deployments to the patched versions 3.4.1, 3.3.1, or 2.6.11 as soon as possible to eliminate the integer overflow vulnerability. 2. Implement network segmentation and firewall rules to restrict DDS traffic only to trusted sources and prevent unauthorized external access to DDS participants. 3. Monitor network traffic for anomalous SPDP packets or unusual DDS message patterns that could indicate exploitation attempts. 4. Employ runtime protections such as memory usage monitoring and process watchdogs to detect and recover from unexpected Fast-DDS crashes. 5. Conduct security reviews and testing of DDS configurations, especially when enabling security mode, to ensure no malformed packets can be processed. 6. Collaborate with vendors and system integrators to verify that all DDS components in the supply chain are updated and securely configured. 7. Consider deploying intrusion detection systems capable of parsing DDS protocols to alert on suspicious activity. These steps go beyond generic advice by focusing on both patching and operational controls tailored to DDS environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f7662ec

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/11/2026, 11:51:00 AM

Last updated: 3/23/2026, 11:02:08 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses