CVE-2025-62602

7.5 HIGH

📋 TL;DR

This vulnerability in Fast DDS allows remote attackers to cause denial-of-service by sending specially crafted SPDP packets with manipulated DATA Submessage fields. When security mode is enabled, tampering with PID_IDENTITY_TOKEN or PID_PERMISSIONS_TOKEN fields triggers a heap buffer overflow via integer overflow, leading to process termination. Systems using vulnerable Fast DDS versions with security enabled are affected.

💻 Affected Systems

Products:
  • Fast DDS (formerly Fast RTPS)
Versions: All versions before 3.4.1, 3.3.1, and 2.6.11
Operating Systems: All platforms running Fast DDS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when security mode is enabled. The vulnerability requires the attacker to modify SPDP packets with manipulated DATA Submessage fields.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote process termination leading to complete service disruption of DDS-based applications, potentially affecting critical systems like autonomous vehicles, industrial control, or medical devices.

🟠

Likely Case

Remote denial-of-service causing Fast-DDS process crashes and service interruption in affected applications.

🟢

If Mitigated

Limited impact if security mode is disabled or network segmentation prevents attacker access.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible if Fast-DDS endpoints are exposed to untrusted networks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to disrupt DDS communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of DDS protocol and ability to craft/modify SPDP packets. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.1, 3.3.1, or 2.6.11

Vendor Advisory: https://github.com/eProsima/Fast-DDS/security/advisories

Restart Required: Yes

Instructions:

1. Identify your Fast DDS version. 2. Upgrade to patched version: 3.4.1 for 3.4.x branch, 3.3.1 for 3.3.x branch, or 2.6.11 for 2.6.x branch. 3. Recompile applications using Fast DDS. 4. Restart all Fast DDS processes.

🔧 Temporary Workarounds

Disable Security Mode

all

Temporarily disable Fast DDS security features if not required, as vulnerability only affects security-enabled configurations.

Modify Fast DDS configuration XML to set <security><enabled>false</enabled></security>

Network Segmentation

linux

Restrict network access to Fast DDS endpoints using firewalls or network policies.

iptables -A INPUT -p tcp --dport 7400 -j DROP
iptables -A INPUT -p udp --dport 7400 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Fast DDS traffic to trusted networks only
  • Deploy intrusion detection/prevention systems to monitor for SPDP packet manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check Fast DDS version and verify security mode is enabled. Vulnerable if version < 3.4.1, < 3.3.1, or < 2.6.11 with security enabled.

Check Version:

Check build configuration or run application with --version flag if available

Verify Fix Applied:

Confirm Fast DDS version is 3.4.1, 3.3.1, or 2.6.11 or higher. Test with security mode enabled to ensure no crashes from SPDP manipulation.

📡 Detection & Monitoring

Log Indicators:

  • Fast DDS process crashes
  • Segmentation fault errors
  • Out of memory errors in system logs

Network Indicators:

  • Unusual SPDP packet patterns
  • Modified DATA Submessage fields in DDS traffic
  • Traffic to/from port 7400 with manipulated tokens

SIEM Query:

source="fastdds.log" AND ("segmentation fault" OR "heap overflow" OR "process terminated")

🔗 References

📤 Share & Export