Vulnerability Description
An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d
- https://github.com/ros2/sros2/issues/282
- https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d
FAQ
What is CVE-2023-24010?
CVE-2023-24010 is a vulnerability with a CVSS score of 8.2 (HIGH). An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnera...
How severe is CVE-2023-24010?
CVE-2023-24010 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24010?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.