An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Jan 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures. | |
| Title | Data Distribution Service (DDS) Chain of Trust (CoT) violation vulnerability in Open DDS | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2025-01-09T14:36:15.692Z
Updated: 2025-01-09T20:05:44.907012Z
Reserved: 2023-01-20T12:00:57.059Z
Link: CVE-2023-24012
Updated: 2025-01-09T15:26:55.906Z
Status : Received
Published: 2025-01-09T15:15:11.810
Modified: 2025-01-09T16:15:31.440
Link: CVE-2023-24012
No data.