CVE-2024-30259

8.2 HIGH

📋 TL;DR

CVE-2024-30259 is a heap buffer overflow vulnerability in FastDDS that allows remote attackers to crash Fast-DDS processes by sending malformed RTPS packets. This can lead to denial of service attacks against systems using vulnerable FastDDS implementations. Any organization using FastDDS for data distribution in industrial, automotive, or IoT applications is potentially affected.

💻 Affected Systems

Products:
  • FastDDS (eProsima Fast DDS)
Versions: All versions prior to 2.14.1, 2.13.5, 2.10.4, and 2.6.8
Operating Systems: All operating systems where FastDDS is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Any FastDDS subscriber implementation is vulnerable when receiving RTPS packets from publishers. The vulnerability is protocol-level and affects all configurations using RTPS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all FastDDS-dependent systems, potentially disrupting critical operations in industrial control, automotive, or IoT environments where data distribution is essential.

🟠

Likely Case

Service disruption and system crashes affecting data distribution services, requiring manual intervention to restart affected processes.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring, though systems remain vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH - FastDDS implementations exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending malformed RTPS packets to a subscriber, which is straightforward for attackers familiar with the protocol. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.14.1, 2.13.5, 2.10.4, or 2.6.8

Vendor Advisory: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662

Restart Required: Yes

Instructions:

1. Identify your current FastDDS version
2. Upgrade to the appropriate patched version: 2.14.1, 2.13.5, 2.10.4, or 2.6.8
3. Recompile and rebuild any applications using FastDDS
4. Restart all FastDDS-dependent services

🔧 Temporary Workarounds

Network Segmentation

linux

Isolate FastDDS traffic to trusted networks only

iptables -A INPUT -p tcp --dport 7400 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 7400 -j DROP

Rate Limiting

linux

Limit RTPS packet processing rate to reduce impact

tc qdisc add dev eth0 root tbf rate 10mbit burst 32kbit latency 400ms

🧯 If You Can't Patch

  • Implement strict network access controls to limit RTPS traffic to trusted sources only
  • Deploy intrusion detection systems to monitor for malformed RTPS packets and alert on suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check FastDDS version against vulnerable ranges: versions <2.14.1, <2.13.5, <2.10.4, and <2.6.8

Check Version:

fastdds --version or check build configuration files

Verify Fix Applied:

Confirm version is 2.14.1, 2.13.5, 2.10.4, or 2.6.8 and test with RTPS packet fuzzing tools

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault or crash logs from FastDDS processes
  • Abnormal termination of FastDDS subscriber processes
  • Memory allocation errors in system logs

Network Indicators:

  • Unusual RTPS packet patterns from untrusted sources
  • High volume of malformed RTPS packets
  • Traffic spikes on RTPS ports (typically 7400)

SIEM Query:

process_name="fastdds" AND (event_type="crash" OR event_type="segfault")

🔗 References

📤 Share & Export