Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64098: CWE-125 Out-of-bounds Read in eProsima Fast-DDS

0
Low
VulnerabilityCVE-2025-64098cvecve-2025-64098cwe-125cwe-190
Published: Tue Feb 03 2026 (02/03/2026, 19:29:09 UTC)
Source: CVE Database V5
Vendor/Project: eProsima
Product: Fast-DDS

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t he fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specifically by ta mpering with the the `vecsize` value read by `readOctetVector` — a 32-bit integer overflow can occur, causing `std::vector ::resize` to request an attacker-controlled size and quickly trigger OOM and remote process termination. Versions 3.4.1, 3 .3.1, and 2.6.11 patch the issue.

AI-Powered Analysis

AILast updated: 02/03/2026, 20:00:49 UTC

Technical Analysis

CVE-2025-64098 is an out-of-bounds read vulnerability classified under CWE-125 and CWE-190 affecting eProsima Fast-DDS, a C++ implementation of the OMG DDS standard used for real-time data distribution. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, if an attacker modifies the DATA Submessage within an SPDP packet sent by a publisher, they can tamper with the `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` fields. These fields include a `vecsize` value read by the `readOctetVector` function. By manipulating this 32-bit integer value, an integer overflow occurs, causing the `std::vector::resize` method to allocate an attacker-controlled size. This leads to an out-of-memory (OOM) condition that causes the Fast-DDS process to terminate remotely, resulting in a denial-of-service (DoS) condition. The vulnerability does not require authentication or user interaction and can be triggered remotely over the network. There are no known exploits in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity due to limited impact and ease of exploitation. The issue is patched in Fast-DDS versions 3.4.1, 3.3.1, and 2.6.11.

Potential Impact

The primary impact of CVE-2025-64098 is denial of service through remote process termination of Fast-DDS instances. For European organizations, this could disrupt real-time data distribution in critical systems such as industrial automation, automotive communication networks, aerospace, defense, and IoT deployments that rely on Fast-DDS for reliable and timely data exchange. Although the vulnerability does not allow data disclosure or code execution, availability loss in these environments can lead to operational downtime, safety risks, and potential cascading failures in interconnected systems. Organizations in sectors with stringent uptime requirements or safety-critical operations may face significant operational and reputational impacts if this vulnerability is exploited. However, the lack of known exploits and the requirement for specific packet tampering reduce the immediate threat level.

Mitigation Recommendations

European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 where the vulnerability is patched. Network-level filtering should be implemented to restrict and monitor SPDP packet traffic, especially from untrusted or external sources, to reduce exposure. Deploy intrusion detection systems (IDS) with signatures or heuristics to detect anomalous SPDP packets with malformed DATA Submessages. Conduct thorough code reviews and fuzz testing on custom DDS implementations or extensions to identify similar integer overflow or out-of-bounds read issues. Additionally, implement robust resource limits and process isolation to mitigate the impact of potential OOM conditions. Regularly audit and update security configurations of Fast-DDS deployments, ensuring security mode is enabled with validated token handling. Finally, maintain incident response readiness to quickly recover from potential DoS events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-27T15:26:14.126Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69825048f9fa50a62fdc1998

Added to database: 2/3/2026, 7:45:12 PM

Last enriched: 2/3/2026, 8:00:49 PM

Last updated: 2/4/2026, 3:18:59 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats