CVE-2025-62799

Severity CVSS v4.0:
HIGH
Type:
CWE-122 Heap-based Buffer Overflow
Publication date:
03/02/2026
Last modified:
18/02/2026

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br /> ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un<br /> authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft<br /> ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write<br /> s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption (<br /> RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* 2.6.11 (excluding)
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* 3.0.0 (including) 3.3.1 (excluding)
cpe:2.3:a:eprosima:fast_dds:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*