CVE-2025-63547
Published: 01 May 2026
Summary
CVE-2025-63547 is a high-severity Buffer Access with Incorrect Length Value (CWE-805) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 29.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CWE-805 buffer size argument validation error by requiring validation of inputs like the MTU length field to prevent crashes from crafted packets.
Provides comprehensive denial-of-service protection mechanisms to limit the effects of resource exhaustion or crashes triggered by malformed MTU packets.
Ensures timely identification, reporting, and patching of the specific flaw in Micro-XRCE-DDS Agent v3.0.1 handling MTU length fields.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote unauthenticated DoS via crafted packet exploiting a buffer validation flaw in the DDS agent, directly enabling T1499.004 (Application or System Exploitation) for service crash/resource exhaustion.
NVD Description
An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field
Deeper analysisAI
CVE-2025-63547 is a denial-of-service vulnerability in Eprosima Micro-XRCE-DDS Agent version 3.0.1. The flaw stems from improper handling of the MTU length field, enabling a remote attacker to trigger a crash or resource exhaustion via a specially crafted packet. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and maps to CWE-805 (Buffer Size Argument Validation Error). The vulnerability was published on 2026-05-01T18:16:13.310.
Any unauthenticated remote attacker with network access to the affected agent can exploit this issue with low complexity and no user interaction required. Exploitation involves sending a malicious packet that manipulates the MTU length field, resulting in high-impact denial of service through availability disruption, such as service crashes, without affecting confidentiality or integrity.
Mitigation details and further advisories are documented in the project's GitHub issue at https://github.com/eProsima/Micro-XRCE-DDS-Agent/issues/390 and a CVE listing at https://github.com/j4kb4dw0lf/CVEs/blob/main/README.md. Security practitioners should consult these sources for patch information, workarounds, or updated versions of the agent.
Details
- CWE(s)