Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62599: CWE-190 Integer Overflow or Wraparound in eProsima Fast-DDS

0
Low
VulnerabilityCVE-2025-62599cvecve-2025-62599cwe-190cwe-125
Published: Tue Feb 03 2026 (02/03/2026, 17:54:49 UTC)
Source: CVE Database V5
Vendor/Project: eProsima
Product: Fast-DDS

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t he fields of PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN in the DATA Submessage — specifically by tampering with the length field in readPropertySeq — are modified, an integer overflow occurs, leading to an OOM during the resize operation. Versi ons 3.4.1, 3.3.1, and 2.6.11 patch the issue.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:09:47 UTC

Technical Analysis

CVE-2025-62599 is a security vulnerability identified in eProsima Fast-DDS, a widely used C++ implementation of the Object Management Group's Data Distribution Service (DDS) standard. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, the vulnerability arises from improper handling of the DATA Submessage within the SPDP (Simple Participant Discovery Protocol) packets sent by publishers. By tampering with the length field in the readPropertySeq of the PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN fields within the DATA Submessage, an integer overflow (CWE-190) occurs. This overflow leads to an out-of-memory (OOM) condition during a resize operation, causing the Fast-DDS process to terminate unexpectedly. The vulnerability is a denial-of-service type, as it results in remote termination of the service without requiring authentication or user interaction. The CVSS 4.0 base score is 1.7, reflecting low severity due to limited impact and exploitation complexity. No known exploits are currently reported in the wild. The root cause is an integer overflow that triggers an out-of-bounds memory allocation attempt (CWE-125), which can be mitigated by proper input validation and bounds checking. The vendor has addressed the issue in versions 3.4.1, 3.3.1, and 2.6.11.

Potential Impact

The primary impact of CVE-2025-62599 is denial of service through remote termination of Fast-DDS processes. For European organizations relying on Fast-DDS for real-time data distribution in critical infrastructure, industrial automation, automotive systems, or defense applications, this could lead to temporary loss of communication or system availability. While the vulnerability does not allow unauthorized data access or code execution, disruption of DDS middleware can affect operational continuity, safety systems, and data integrity indirectly. The low CVSS score indicates limited risk, but in environments where high availability is essential, even short outages can have significant operational or financial consequences. European organizations with deployments in sectors such as manufacturing, automotive, aerospace, and smart grid systems should consider the potential impact on their distributed systems and plan accordingly.

Mitigation Recommendations

To mitigate CVE-2025-62599, European organizations should promptly update eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 or later, where the vulnerability is patched. In environments where immediate patching is not feasible, network-level controls should be implemented to restrict or monitor SPDP traffic from untrusted sources to prevent malicious packet injection. Additionally, organizations should enable logging and anomaly detection on DDS communications to identify unusual or malformed DATA Submessages. Security mode should be configured carefully, and input validation mechanisms should be reviewed to ensure robustness against malformed tokens. Regular vulnerability scanning and integration of Fast-DDS updates into the software supply chain management process will reduce exposure. Finally, conducting resilience testing and failover planning for DDS-dependent systems will help mitigate operational impact from potential denial-of-service events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f7662ec

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/4/2026, 8:09:47 AM

Last updated: 2/7/2026, 6:09:51 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats