Vulnerability Description
eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If the fields of PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN in the DATA Submessage — specifically by tampering with the length field in readBinaryPropertySeq— are modified, an integer overflow occurs, leading to an OOM during the resize operation. This vulnerability is fixed in 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eprosima | Fast Dds | < 2.6.11 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-hvm8-mm7f-m6hc
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-hvm8-mm7f-m6hc
FAQ
What is CVE-2025-62600?
CVE-2025-62600 is a vulnerability with a CVSS score of 8.6 (HIGH). eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1, when the security mode...
How severe is CVE-2025-62600?
CVE-2025-62600 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62600?
Check the references section above for vendor advisories and patch information. Affected products include: Eprosima Fast Dds, Debian Debian Linux.