An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Jan 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures. | |
Title | Data Distribution Service (DDS) Chain of Trust (CoT) violation in Fast DDS | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: INCIBE
Published: 2025-01-09T14:36:05.972Z
Updated: 2025-01-09T20:05:48.421277Z
Reserved: 2023-01-20T12:00:57.059Z
Link: CVE-2023-24010
Vulnrichment
Updated: 2025-01-09T15:30:12.991Z
NVD
Status : Received
Published: 2025-01-09T15:15:11.467
Modified: 2025-01-09T16:15:30.803
Link: CVE-2023-24010
Redhat
No data.