CVE-2025-64098: CWE-125 Out-of-bounds Read in eProsima Fast-DDS
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t he fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specifically by ta mpering with the the `vecsize` value read by `readOctetVector` — a 32-bit integer overflow can occur, causing `std::vector ::resize` to request an attacker-controlled size and quickly trigger OOM and remote process termination. Versions 3.4.1, 3 .3.1, and 2.6.11 patch the issue.
AI Analysis
Technical Summary
CVE-2025-64098 is an out-of-bounds read vulnerability classified under CWE-125 and CWE-190 affecting eProsima Fast-DDS, a C++ implementation of the OMG DDS standard used for real-time data distribution. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, if an attacker modifies the DATA Submessage within an SPDP packet sent by a publisher, they can tamper with the `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` fields. These fields include a `vecsize` value read by the `readOctetVector` function. By manipulating this 32-bit integer value, an integer overflow occurs, causing the `std::vector::resize` method to allocate an attacker-controlled size. This leads to an out-of-memory (OOM) condition that causes the Fast-DDS process to terminate remotely, resulting in a denial-of-service (DoS) condition. The vulnerability does not require authentication or user interaction and can be triggered remotely over the network. There are no known exploits in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity due to limited impact and ease of exploitation. The issue is patched in Fast-DDS versions 3.4.1, 3.3.1, and 2.6.11.
Potential Impact
The primary impact of CVE-2025-64098 is denial of service through remote process termination of Fast-DDS instances. For European organizations, this could disrupt real-time data distribution in critical systems such as industrial automation, automotive communication networks, aerospace, defense, and IoT deployments that rely on Fast-DDS for reliable and timely data exchange. Although the vulnerability does not allow data disclosure or code execution, availability loss in these environments can lead to operational downtime, safety risks, and potential cascading failures in interconnected systems. Organizations in sectors with stringent uptime requirements or safety-critical operations may face significant operational and reputational impacts if this vulnerability is exploited. However, the lack of known exploits and the requirement for specific packet tampering reduce the immediate threat level.
Mitigation Recommendations
European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 where the vulnerability is patched. Network-level filtering should be implemented to restrict and monitor SPDP packet traffic, especially from untrusted or external sources, to reduce exposure. Deploy intrusion detection systems (IDS) with signatures or heuristics to detect anomalous SPDP packets with malformed DATA Submessages. Conduct thorough code reviews and fuzz testing on custom DDS implementations or extensions to identify similar integer overflow or out-of-bounds read issues. Additionally, implement robust resource limits and process isolation to mitigate the impact of potential OOM conditions. Regularly audit and update security configurations of Fast-DDS deployments, ensuring security mode is enabled with validated token handling. Finally, maintain incident response readiness to quickly recover from potential DoS events.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2025-64098: CWE-125 Out-of-bounds Read in eProsima Fast-DDS
Description
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t he fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specifically by ta mpering with the the `vecsize` value read by `readOctetVector` — a 32-bit integer overflow can occur, causing `std::vector ::resize` to request an attacker-controlled size and quickly trigger OOM and remote process termination. Versions 3.4.1, 3 .3.1, and 2.6.11 patch the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-64098 is an out-of-bounds read vulnerability classified under CWE-125 and CWE-190 affecting eProsima Fast-DDS, a C++ implementation of the OMG DDS standard used for real-time data distribution. The flaw exists in versions prior to 3.4.1, 3.3.1, and 2.6.11 when the security mode is enabled. Specifically, if an attacker modifies the DATA Submessage within an SPDP packet sent by a publisher, they can tamper with the `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` fields. These fields include a `vecsize` value read by the `readOctetVector` function. By manipulating this 32-bit integer value, an integer overflow occurs, causing the `std::vector::resize` method to allocate an attacker-controlled size. This leads to an out-of-memory (OOM) condition that causes the Fast-DDS process to terminate remotely, resulting in a denial-of-service (DoS) condition. The vulnerability does not require authentication or user interaction and can be triggered remotely over the network. There are no known exploits in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity due to limited impact and ease of exploitation. The issue is patched in Fast-DDS versions 3.4.1, 3.3.1, and 2.6.11.
Potential Impact
The primary impact of CVE-2025-64098 is denial of service through remote process termination of Fast-DDS instances. For European organizations, this could disrupt real-time data distribution in critical systems such as industrial automation, automotive communication networks, aerospace, defense, and IoT deployments that rely on Fast-DDS for reliable and timely data exchange. Although the vulnerability does not allow data disclosure or code execution, availability loss in these environments can lead to operational downtime, safety risks, and potential cascading failures in interconnected systems. Organizations in sectors with stringent uptime requirements or safety-critical operations may face significant operational and reputational impacts if this vulnerability is exploited. However, the lack of known exploits and the requirement for specific packet tampering reduce the immediate threat level.
Mitigation Recommendations
European organizations should immediately upgrade eProsima Fast-DDS to versions 3.4.1, 3.3.1, or 2.6.11 where the vulnerability is patched. Network-level filtering should be implemented to restrict and monitor SPDP packet traffic, especially from untrusted or external sources, to reduce exposure. Deploy intrusion detection systems (IDS) with signatures or heuristics to detect anomalous SPDP packets with malformed DATA Submessages. Conduct thorough code reviews and fuzz testing on custom DDS implementations or extensions to identify similar integer overflow or out-of-bounds read issues. Additionally, implement robust resource limits and process isolation to mitigate the impact of potential OOM conditions. Regularly audit and update security configurations of Fast-DDS deployments, ensuring security mode is enabled with validated token handling. Finally, maintain incident response readiness to quickly recover from potential DoS events.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-27T15:26:14.126Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69825048f9fa50a62fdc1998
Added to database: 2/3/2026, 7:45:12 PM
Last enriched: 2/3/2026, 8:00:49 PM
Last updated: 2/4/2026, 3:18:59 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.