CVE-2025-62799
moderate-risk
Published 2026-02-03
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: f4eaa03986ab228f56042160761836995974e671, 4ba5a3b754ee4fd40f8ae0feb3aff7e6708aae4a, 87dd60c8f3e8694481ad0279bd4cc8c645050da3
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
References (4)
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2025-62799
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
0/34 · Minimal
Exposure
12/34 · Low