An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
References
Configurations
No configuration.
History
09 Jan 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d - |
09 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-09 15:15
Updated : 2025-01-09 16:15
NVD link : CVE-2023-24010
Mitre link : CVE-2023-24010
CVE.ORG link : CVE-2023-24010
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor