Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62601: CWE-122 Heap-based Buffer Overflow in eProsima Fast-DDS

0
Low
VulnerabilityCVE-2025-62601cvecve-2025-62601cwe-122
Published: Tue Feb 03 2026 (02/03/2026, 19:16:20 UTC)
Source: CVE Database V5
Vendor/Project: eProsima
Product: Fast-DDS

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` value read by `readString` (called from `readBinaryProperty`) — are modified, a 32-bit integer overflow can occur, causing `std::vector::resize` to use an attacker-controlled size and quickly trigger heap buffer overflow and remote process term ination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.

AI-Powered Analysis

AILast updated: 02/03/2026, 20:01:26 UTC

Technical Analysis

CVE-2025-62601 is a heap-based buffer overflow vulnerability identified in eProsima Fast-DDS, a C++ implementation of the OMG Data Distribution Service (DDS) standard. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. The vulnerability arises from improper handling of the DATA Submessage within an SPDP packet sent by a publisher. Specifically, if an attacker modifies the PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields by tampering with the str_size value read by the readString function (invoked from readBinaryProperty), a 32-bit integer overflow occurs. This overflow causes std::vector::resize to use an attacker-controlled size, leading to a heap buffer overflow. The consequence is a remote process termination of Fast-DDS, effectively a denial-of-service condition. The vulnerability does not require authentication or user interaction and does not impact confidentiality, integrity, or availability beyond process termination. There are no known exploits in the wild. The issue has been patched in versions 3.4.1, 3.3.1, and 2.6.11 of Fast-DDS.

Potential Impact

For European organizations, the primary impact of this vulnerability is denial of service through remote termination of Fast-DDS processes. This can disrupt critical real-time communication systems relying on DDS middleware, such as industrial automation, automotive systems, robotics, and defense applications. Disruption in these systems could lead to operational downtime, safety risks, and loss of productivity. Since Fast-DDS is used in environments requiring reliable data distribution, even temporary outages can have significant operational consequences. However, the vulnerability does not allow for code execution or data compromise, limiting its impact to availability. Organizations using affected versions in production environments with security mode enabled are at risk if exposed to untrusted network traffic. The absence of known exploits reduces immediate risk but does not eliminate the need for mitigation.

Mitigation Recommendations

European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 or later to remediate this vulnerability. In addition, network segmentation should be enforced to restrict access to DDS communication ports only to trusted and authenticated devices, minimizing exposure to malicious SPDP packets. Implementing strict input validation and anomaly detection on DDS traffic can help identify and block malformed or tampered DATA Submessages. Monitoring Fast-DDS process health and setting up automated restart mechanisms can reduce downtime in case of unexpected termination. Organizations should also review and harden their DDS security configurations, ensuring that only authorized publishers can send SPDP packets. Finally, conducting regular vulnerability assessments and penetration testing on DDS deployments will help detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69825048f9fa50a62fdc1980

Added to database: 2/3/2026, 7:45:12 PM

Last enriched: 2/3/2026, 8:01:26 PM

Last updated: 2/4/2026, 1:19:20 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats