Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62602: CWE-122 Heap-based Buffer Overflow in eProsima Fast-DDS

0
Low
VulnerabilityCVE-2025-62602cvecve-2025-62602cwe-122
Published: Tue Feb 03 2026 (02/03/2026, 19:20:55 UTC)
Source: CVE Database V5
Vendor/Project: eProsima
Product: Fast-DDS

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specially `readOctetVector` reads an unchecked `vecsize` that is propagated unchanged into `readData` as the `length` parameter — the attacker-contro lled `vecsize` can trigger a 32-bit integer overflow during the `length` calculation. That overflow can cause large alloca tion attempt that quickly leads to OOM, enabling a remotely-triggerable denial-of-service and remote process termination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.

AI-Powered Analysis

AILast updated: 02/03/2026, 20:01:15 UTC

Technical Analysis

The vulnerability identified as CVE-2025-62602 affects eProsima Fast-DDS, a C++ implementation of the OMG DDS standard used for real-time data distribution in distributed systems. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when security mode is enabled. Specifically, an attacker can craft an SPDP packet with a manipulated DATA Submessage, targeting the PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields. The vulnerability arises because the function readOctetVector reads a vector size (vecsize) without proper bounds checking. This unchecked vecsize is then passed as the length parameter to readData, where a 32-bit integer overflow can occur during length calculation. The overflow leads to an attempt to allocate an excessively large buffer on the heap, which quickly exhausts system memory and causes the Fast-DDS process to terminate unexpectedly. This results in a remotely-triggerable denial-of-service (DoS) condition. The flaw does not require any authentication or user interaction, and the attack vector is network-based (AV:N). Although the CVSS score is low (1.7), reflecting limited impact on confidentiality, integrity, and availability, the vulnerability can disrupt availability of critical DDS-based communication. No public exploits have been reported, and patches are available in the specified versions to remediate the issue.

Potential Impact

For European organizations, the primary impact is a potential denial-of-service condition in systems relying on Fast-DDS for real-time data exchange, such as industrial automation, autonomous vehicles, healthcare devices, and defense applications. Disruption of DDS communications can lead to loss of operational continuity, safety risks, and degraded service availability. While the vulnerability does not allow code execution or data compromise, the forced termination of Fast-DDS processes could interrupt critical workflows and safety mechanisms. Organizations in sectors with stringent real-time requirements or safety-critical operations are particularly at risk. Given the low CVSS score and lack of known exploits, the immediate risk is moderate, but the potential for targeted DoS attacks in sensitive environments warrants attention.

Mitigation Recommendations

European organizations should prioritize upgrading eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 or later, where the vulnerability is patched. Network-level filtering can be implemented to restrict or monitor SPDP packets, especially those containing PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields, to detect anomalous or malformed messages. Deploying intrusion detection systems (IDS) with custom signatures for malformed DDS packets may help identify exploitation attempts. Additionally, organizations should enforce strict network segmentation to isolate DDS traffic and reduce exposure to untrusted networks. Regularly auditing and monitoring Fast-DDS logs for unexpected process terminations can provide early warning of exploitation attempts. Finally, integrating Fast-DDS updates into the organization's patch management lifecycle will ensure timely remediation of future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69825048f9fa50a62fdc1986

Added to database: 2/3/2026, 7:45:12 PM

Last enriched: 2/3/2026, 8:01:15 PM

Last updated: 2/7/2026, 4:00:19 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats