CVE-2025-62601: CWE-122 Heap-based Buffer Overflow in eProsima Fast-DDS
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` value read by `readString` (called from `readBinaryProperty`) — are modified, a 32-bit integer overflow can occur, causing `std::vector::resize` to use an attacker-controlled size and quickly trigger heap buffer overflow and remote process term ination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
AI Analysis
Technical Summary
CVE-2025-62601 is a heap-based buffer overflow vulnerability identified in eProsima Fast-DDS, a C++ implementation of the OMG Data Distribution Service (DDS) standard. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. The vulnerability arises from improper handling of the DATA Submessage within an SPDP packet sent by a publisher. Specifically, if an attacker modifies the PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields by tampering with the str_size value read by the readString function (invoked from readBinaryProperty), a 32-bit integer overflow occurs. This overflow causes std::vector::resize to use an attacker-controlled size, leading to a heap buffer overflow. The consequence is a remote process termination of Fast-DDS, effectively a denial-of-service condition. The vulnerability does not require authentication or user interaction and does not impact confidentiality, integrity, or availability beyond process termination. There are no known exploits in the wild. The issue has been patched in versions 3.4.1, 3.3.1, and 2.6.11 of Fast-DDS.
Potential Impact
For European organizations, the primary impact of this vulnerability is denial of service through remote termination of Fast-DDS processes. This can disrupt critical real-time communication systems relying on DDS middleware, such as industrial automation, automotive systems, robotics, and defense applications. Disruption in these systems could lead to operational downtime, safety risks, and loss of productivity. Since Fast-DDS is used in environments requiring reliable data distribution, even temporary outages can have significant operational consequences. However, the vulnerability does not allow for code execution or data compromise, limiting its impact to availability. Organizations using affected versions in production environments with security mode enabled are at risk if exposed to untrusted network traffic. The absence of known exploits reduces immediate risk but does not eliminate the need for mitigation.
Mitigation Recommendations
European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 or later to remediate this vulnerability. In addition, network segmentation should be enforced to restrict access to DDS communication ports only to trusted and authenticated devices, minimizing exposure to malicious SPDP packets. Implementing strict input validation and anomaly detection on DDS traffic can help identify and block malformed or tampered DATA Submessages. Monitoring Fast-DDS process health and setting up automated restart mechanisms can reduce downtime in case of unexpected termination. Organizations should also review and harden their DDS security configurations, ensuring that only authorized publishers can send SPDP packets. Finally, conducting regular vulnerability assessments and penetration testing on DDS deployments will help detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-62601: CWE-122 Heap-based Buffer Overflow in eProsima Fast-DDS
Description
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` value read by `readString` (called from `readBinaryProperty`) — are modified, a 32-bit integer overflow can occur, causing `std::vector::resize` to use an attacker-controlled size and quickly trigger heap buffer overflow and remote process term ination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-62601 is a heap-based buffer overflow vulnerability identified in eProsima Fast-DDS, a C++ implementation of the OMG Data Distribution Service (DDS) standard. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. The vulnerability arises from improper handling of the DATA Submessage within an SPDP packet sent by a publisher. Specifically, if an attacker modifies the PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields by tampering with the str_size value read by the readString function (invoked from readBinaryProperty), a 32-bit integer overflow occurs. This overflow causes std::vector::resize to use an attacker-controlled size, leading to a heap buffer overflow. The consequence is a remote process termination of Fast-DDS, effectively a denial-of-service condition. The vulnerability does not require authentication or user interaction and does not impact confidentiality, integrity, or availability beyond process termination. There are no known exploits in the wild. The issue has been patched in versions 3.4.1, 3.3.1, and 2.6.11 of Fast-DDS.
Potential Impact
For European organizations, the primary impact of this vulnerability is denial of service through remote termination of Fast-DDS processes. This can disrupt critical real-time communication systems relying on DDS middleware, such as industrial automation, automotive systems, robotics, and defense applications. Disruption in these systems could lead to operational downtime, safety risks, and loss of productivity. Since Fast-DDS is used in environments requiring reliable data distribution, even temporary outages can have significant operational consequences. However, the vulnerability does not allow for code execution or data compromise, limiting its impact to availability. Organizations using affected versions in production environments with security mode enabled are at risk if exposed to untrusted network traffic. The absence of known exploits reduces immediate risk but does not eliminate the need for mitigation.
Mitigation Recommendations
European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 or later to remediate this vulnerability. In addition, network segmentation should be enforced to restrict access to DDS communication ports only to trusted and authenticated devices, minimizing exposure to malicious SPDP packets. Implementing strict input validation and anomaly detection on DDS traffic can help identify and block malformed or tampered DATA Submessages. Monitoring Fast-DDS process health and setting up automated restart mechanisms can reduce downtime in case of unexpected termination. Organizations should also review and harden their DDS security configurations, ensuring that only authorized publishers can send SPDP packets. Finally, conducting regular vulnerability assessments and penetration testing on DDS deployments will help detect similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-16T19:24:37.267Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69825048f9fa50a62fdc1980
Added to database: 2/3/2026, 7:45:12 PM
Last enriched: 2/3/2026, 8:01:26 PM
Last updated: 2/4/2026, 1:19:20 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumCVE-2026-1622: CWE-532 Insertion of Sensitive Information into Log File in neo4j Enterprise Edition
MediumCVE-2026-1370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in comprassibs SIBS woocommerce payment gateway
MediumCVE-2026-0816: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gtlwpdev All push notification for WP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.