🔐 CVE Alert

CVE-2023-24012

HIGH 8.2

Data Distribution Service (DDS) Chain of Trust (CoT) violation vulnerability in Open DDS

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.

CWE CWE-200
Vendor opendds
Product dds
Published Jan 9, 2025
Last Updated Jan 9, 2025
Stay Ahead of the Next One

Get instant alerts for opendds dds

Be the first to know when new high vulnerabilities affecting opendds dds are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Affected Versions

OpenDDS / DDS
all versions

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/ros2/sros2/issues/282 gist.github.com: https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d

Credits

amrc-benmorrow Gianluca Caizza Ruffin White Victor Mayoral Vilches Mikael Arguedas