Information Exposure Affecting fastdds package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-FASTDDS-9833927
  • published28 Apr 2025
  • disclosed9 Jan 2025

Introduced: 9 Jan 2025

CVE-2023-24010  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 fastdds.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fastdds package and not the fastdds package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.