CVE-2025-62601

7.5 HIGH

📋 TL;DR

A heap buffer overflow vulnerability in Fast DDS allows remote attackers to terminate the Fast-DDS process by sending specially crafted SPDP packets when security mode is enabled. This affects all Fast DDS implementations using vulnerable versions before the patches. The vulnerability requires security mode to be enabled for exploitation.

💻 Affected Systems

Products:
  • Fast DDS (formerly Fast RTPS)
Versions: All versions before 3.4.1, 3.3.1, and 2.6.11
Operating Systems: All operating systems running Fast DDS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when security mode is enabled. Systems with security mode disabled are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if heap overflow can be weaponized beyond denial of service, though current analysis suggests termination is the primary outcome.

🟠

Likely Case

Remote denial of service causing Fast-DDS process termination, disrupting DDS communications in affected systems.

🟢

If Mitigated

No impact if security mode is disabled or systems are patched to fixed versions.

🌐 Internet-Facing: MEDIUM - Requires security mode enabled and network access to Fast-DDS endpoints, but exploitation leads to service disruption.
🏢 Internal Only: MEDIUM - Internal systems with Fast-DDS using security mode are vulnerable to DoS attacks from internal threat actors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting SPDP packets with modified DATA Submessage fields, but no authentication is needed if network access is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.1, 3.3.1, or 2.6.11 depending on your version branch

Vendor Advisory: https://github.com/eProsima/Fast-DDS/security/advisories

Restart Required: Yes

Instructions:

1. Identify your Fast DDS version. 2. Upgrade to 3.4.1 (for 3.4.x), 3.3.1 (for 3.3.x), or 2.6.11 (for 2.6.x). 3. Restart all Fast DDS services and applications.

🔧 Temporary Workarounds

Disable Security Mode

all

Temporarily disable Fast DDS security mode to prevent exploitation while planning patching

Modify Fast DDS configuration to set <security><enabled>false</enabled></security>

Network Segmentation

linux

Restrict network access to Fast DDS endpoints using firewalls

iptables -A INPUT -p tcp --dport 7400 -j DROP
iptables -A INPUT -p udp --dport 7400 -j DROP

🧯 If You Can't Patch

  • Disable Fast DDS security mode in all configurations
  • Implement strict network controls to limit access to Fast DDS endpoints (ports 7400 typically)

🔍 How to Verify

Check if Vulnerable:

Check Fast DDS version and security mode configuration. If version is below 3.4.1/3.3.1/2.6.11 AND security mode is enabled, system is vulnerable.

Check Version:

fastdds --version or check application linking to Fast DDS libraries

Verify Fix Applied:

Verify Fast DDS version is 3.4.1, 3.3.1, or 2.6.11 or higher, and confirm services restart successfully.

📡 Detection & Monitoring

Log Indicators:

  • Fast DDS process termination/crash logs
  • Segmentation fault errors in system logs
  • Abnormal SPDP packet size warnings

Network Indicators:

  • Unusually large SPDP packets
  • Multiple SPDP packets with modified DATA Submessage fields
  • Traffic to Fast DDS ports (7400) with malformed structure

SIEM Query:

source="fastdds.log" AND ("segmentation fault" OR "buffer overflow" OR "process terminated")

🔗 References

📤 Share & Export