CVE-2025-62601Heap-based Buffer Overflow in Fast-dds

Severity
1.7LOWNVD
EPSS
0.0%
top 94.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 3

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` value read by `re

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5eprosima/fast-dds3.4.03.4.1+2
NVDeprosima/fast_dds3.0.03.3.1+2

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-62601: Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group )2026-02-03
CVEList
FastDDS has heap buffer overflow in readString via Manipulated DATA Submessage when DDS Security is enabled2026-02-03

📋Vendor Advisories

1
Debian
CVE-2025-62601: fastdds - Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-62601 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-62601 — Heap-based Buffer Overflow in Fast-dds | cvebase