Cyber Posture

CVE-2025-62799

Critical

Published: 03 February 2026

Published
03 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-62799 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Eprosima Fast Dds. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates timely remediation of flaws, directly addressing this heap buffer overflow by requiring upgrades to patched Fast DDS versions 3.4.1, 3.3.1, or 2.6.11.

prevent

SI-10 requires validation of information inputs like fragmentSize and sampleSize in RTPS DATA_FRAG packets to prevent buffer overflows from malformed data.

prevent

SI-16 implements memory protections such as ASLR and DEP to mitigate exploitation of the heap buffer overflow for memory corruption or RCE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Remote unauthenticated heap buffer overflow via crafted RTPS DATA_FRAG packets directly enables exploitation of a network-exposed DDS service for DoS or RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un…

more

authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.

Deeper analysisAI

CVE-2025-62799 is a heap buffer overflow vulnerability in the DATA_FRAG receive path of Fast DDS, an open-source C++ implementation of the OMG Data Distribution Service (DDS) standard. The issue affects Fast DDS versions prior to 3.4.1, 3.3.1, and 2.6.11. It stems from a malformed RTPS DATA_FRAG packet where the fragmentSize and sampleSize parameters are crafted to violate internal assumptions, leading to a 4-byte alignment step during fragment metadata initialization that writes past the end of the allocated payload buffer.

An unauthenticated remote attacker can exploit this vulnerability by transmitting a single specially crafted RTPS DATA_FRAG packet to a vulnerable Fast DDS instance. Successful exploitation triggers an immediate crash, resulting in a denial-of-service (DoS) condition, and carries a risk of memory corruption that could enable remote code execution (RCE). The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-122 (Heap-based Buffer Overflow) and CWE-787 (Out-of-bounds Write).

Mitigation is available through upgrading to Fast DDS versions 3.4.1, 3.3.1, or 2.6.11, which include patches addressing the alignment issue in the DATA_FRAG handling code. Relevant patch commits are published in the eProsima/Fast-DDS GitHub repository, and Debian's security tracker documents the issue for affected packages.

Details

CWE(s)

Affected Products

eprosima
fast dds
3.4.0 · ≤ 2.6.11 · 3.0.0 — 3.3.1
debian
debian linux
11.0, 12.0, 13.0

CVEs Like This One

CVE-2025-62602Same product: Debian Debian Linux
CVE-2025-62603Same product: Debian Debian Linux
CVE-2025-62599Same product: Debian Debian Linux
CVE-2025-62600Same product: Debian Debian Linux
CVE-2025-62601Same product: Eprosima Fast Dds
CVE-2025-68615Same product: Debian Debian Linux
CVE-2025-68670Same product: Debian Debian Linux
CVE-2026-24061Same product: Debian Debian Linux
CVE-2025-64438Same product: Eprosima Fast Dds
CVE-2025-24807Same product: Eprosima Fast Dds

References