CVE-2025-62599: CWE-190 Integer Overflow or Wraparound in eProsima Fast-DDS
CVE-2025-62599 is an integer overflow vulnerability in eProsima Fast-DDS prior to versions 3. 4. 1, 3. 3. 1, and 2. 6. 11. When security mode is enabled, specially crafted SPDP packets with modified DATA Submessages can cause an integer overflow in the length field of certain tokens, leading to an out-of-memory (OOM) condition and remote termination of the Fast-DDS process. This vulnerability requires no authentication or user interaction and can be triggered remotely over the network. The CVSS 4.
AI Analysis
Technical Summary
CVE-2025-62599 identifies an integer overflow vulnerability in the eProsima Fast-DDS library, a C++ implementation of the OMG Data Distribution Service standard used for real-time distributed systems communication. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, an attacker can craft a malicious SPDP (Simple Participant Discovery Protocol) packet containing a DATA Submessage with tampered PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN fields. By manipulating the length field within the readPropertySeq sequence, an integer overflow occurs during a resize operation, causing the system to allocate an incorrect amount of memory. This leads to an out-of-memory condition that crashes the Fast-DDS process remotely, resulting in a denial-of-service (DoS). The vulnerability does not require authentication or user interaction and can be exploited over the network, but the impact is limited to process termination without further code execution or data compromise. The vulnerability is tracked under CWE-190 (Integer Overflow or Wraparound) and CWE-125 (Out-of-bounds Read). Although no exploits are known in the wild, the issue is addressed in the patched versions 3.4.1, 3.3.1, and 2.6.11. The CVSS 4.0 base score of 1.7 reflects the low severity due to limited impact and exploitation complexity.
Potential Impact
For European organizations, the primary impact of CVE-2025-62599 is a potential denial-of-service condition in systems using vulnerable versions of Fast-DDS with security mode enabled. This can disrupt real-time communication in distributed applications such as industrial automation, automotive systems, robotics, and critical infrastructure monitoring, where Fast-DDS is commonly deployed. The out-of-memory crash can cause service interruptions, potentially leading to operational downtime and safety risks in time-sensitive environments. Although no data confidentiality or integrity loss is indicated, availability degradation can have significant consequences in sectors relying on continuous and reliable data distribution. The low CVSS score suggests limited risk for widespread exploitation, but targeted attacks against critical systems could still cause localized disruption. European industries with extensive use of DDS-based middleware, especially in Germany, France, Italy, and the Nordic countries, may face higher exposure due to their advanced manufacturing and automotive sectors.
Mitigation Recommendations
1. Upgrade all Fast-DDS deployments to the patched versions 3.4.1, 3.3.1, or 2.6.11 as soon as possible to eliminate the integer overflow vulnerability. 2. Implement network segmentation and firewall rules to restrict DDS traffic only to trusted sources and prevent unauthorized external access to DDS participants. 3. Monitor network traffic for anomalous SPDP packets or unusual DDS message patterns that could indicate exploitation attempts. 4. Employ runtime protections such as memory usage monitoring and process watchdogs to detect and recover from unexpected Fast-DDS crashes. 5. Conduct security reviews and testing of DDS configurations, especially when enabling security mode, to ensure no malformed packets can be processed. 6. Collaborate with vendors and system integrators to verify that all DDS components in the supply chain are updated and securely configured. 7. Consider deploying intrusion detection systems capable of parsing DDS protocols to alert on suspicious activity. These steps go beyond generic advice by focusing on both patching and operational controls tailored to DDS environments.
Affected Countries
Germany, France, Italy, Sweden, Finland, Netherlands, Belgium
CVE-2025-62599: CWE-190 Integer Overflow or Wraparound in eProsima Fast-DDS
Description
CVE-2025-62599 is an integer overflow vulnerability in eProsima Fast-DDS prior to versions 3. 4. 1, 3. 3. 1, and 2. 6. 11. When security mode is enabled, specially crafted SPDP packets with modified DATA Submessages can cause an integer overflow in the length field of certain tokens, leading to an out-of-memory (OOM) condition and remote termination of the Fast-DDS process. This vulnerability requires no authentication or user interaction and can be triggered remotely over the network. The CVSS 4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-62599 identifies an integer overflow vulnerability in the eProsima Fast-DDS library, a C++ implementation of the OMG Data Distribution Service standard used for real-time distributed systems communication. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, an attacker can craft a malicious SPDP (Simple Participant Discovery Protocol) packet containing a DATA Submessage with tampered PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN fields. By manipulating the length field within the readPropertySeq sequence, an integer overflow occurs during a resize operation, causing the system to allocate an incorrect amount of memory. This leads to an out-of-memory condition that crashes the Fast-DDS process remotely, resulting in a denial-of-service (DoS). The vulnerability does not require authentication or user interaction and can be exploited over the network, but the impact is limited to process termination without further code execution or data compromise. The vulnerability is tracked under CWE-190 (Integer Overflow or Wraparound) and CWE-125 (Out-of-bounds Read). Although no exploits are known in the wild, the issue is addressed in the patched versions 3.4.1, 3.3.1, and 2.6.11. The CVSS 4.0 base score of 1.7 reflects the low severity due to limited impact and exploitation complexity.
Potential Impact
For European organizations, the primary impact of CVE-2025-62599 is a potential denial-of-service condition in systems using vulnerable versions of Fast-DDS with security mode enabled. This can disrupt real-time communication in distributed applications such as industrial automation, automotive systems, robotics, and critical infrastructure monitoring, where Fast-DDS is commonly deployed. The out-of-memory crash can cause service interruptions, potentially leading to operational downtime and safety risks in time-sensitive environments. Although no data confidentiality or integrity loss is indicated, availability degradation can have significant consequences in sectors relying on continuous and reliable data distribution. The low CVSS score suggests limited risk for widespread exploitation, but targeted attacks against critical systems could still cause localized disruption. European industries with extensive use of DDS-based middleware, especially in Germany, France, Italy, and the Nordic countries, may face higher exposure due to their advanced manufacturing and automotive sectors.
Mitigation Recommendations
1. Upgrade all Fast-DDS deployments to the patched versions 3.4.1, 3.3.1, or 2.6.11 as soon as possible to eliminate the integer overflow vulnerability. 2. Implement network segmentation and firewall rules to restrict DDS traffic only to trusted sources and prevent unauthorized external access to DDS participants. 3. Monitor network traffic for anomalous SPDP packets or unusual DDS message patterns that could indicate exploitation attempts. 4. Employ runtime protections such as memory usage monitoring and process watchdogs to detect and recover from unexpected Fast-DDS crashes. 5. Conduct security reviews and testing of DDS configurations, especially when enabling security mode, to ensure no malformed packets can be processed. 6. Collaborate with vendors and system integrators to verify that all DDS components in the supply chain are updated and securely configured. 7. Consider deploying intrusion detection systems capable of parsing DDS protocols to alert on suspicious activity. These steps go beyond generic advice by focusing on both patching and operational controls tailored to DDS environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-16T19:24:37.267Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6982fcd3f9fa50a62f7662ec
Added to database: 2/4/2026, 8:01:23 AM
Last enriched: 2/11/2026, 11:51:00 AM
Last updated: 3/23/2026, 11:02:08 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.