CVE-2025-64438

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a remotely triggerable Out-of-Memory (OOM) denial-of-service exists in Fast -DDS when processing RTPS GAP submessages under RELIABLE QoS. By sending a tiny GAP packet with a huge gap range (`gapList .base - gapStart`), an attacker drives `StatefulReader::processGapMsg()` into an unbounded loop that inserts millions of s equence numbers into `WriterProxy::changes_received_` (`std::set`), causing multi-GB heap growth and process termination. No authentication is required beyond network reachability to the reader on the DDS domain. In environments without an RSS limit (non-ASan / unlimited), memory consumption was observed to rise to ~64 GB. Versions 3.4.1, 3.3.1, and 2.6.11 patch t he issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:3.4.0:*:*:*:*:*:*:*

History

18 Feb 2026, 16:02

Type Values Removed Values Added
References () https://github.com/eProsima/Fast-DDS/commit/0b0cb308eaeeb2175694aa0a0a723106824ce9a7 - () https://github.com/eProsima/Fast-DDS/commit/0b0cb308eaeeb2175694aa0a0a723106824ce9a7 - Patch
References () https://github.com/eProsima/Fast-DDS/commit/71da01b4aea4d937558984f2cf0089f5ba3c871f - () https://github.com/eProsima/Fast-DDS/commit/71da01b4aea4d937558984f2cf0089f5ba3c871f - Patch
References () https://github.com/eProsima/Fast-DDS/commit/8ca016134dac20b6e30e42b7b73466ef7cdbc213 - () https://github.com/eProsima/Fast-DDS/commit/8ca016134dac20b6e30e42b7b73466ef7cdbc213 - Patch
References () https://security-tracker.debian.org/tracker/CVE-2025-64438 - () https://security-tracker.debian.org/tracker/CVE-2025-64438 - Third Party Advisory
Summary
  • (es) Fast DDS es una implementación en C++ del estándar DDS (Data Distribution Service) de la OMG (Object Management Group). Antes de las versiones 3.4.1, 3.3.1 y 2.6.11, existe una denegación de servicio por falta de memoria (OOM) que puede ser activada remotamente en Fast-DDS al procesar submensajes RTPS GAP bajo QoS RELIABLE. Al enviar un pequeño paquete GAP con un enorme rango de brecha ('gapList.base - gapStart'), un atacante lleva a 'StatefulReader::processGapMsg()' a un bucle ilimitado que inserta millones de números de secuencia en 'WriterProxy::changes_received_' ('std::set'), causando un crecimiento de la pila de varios GB y la terminación del proceso. No se requiere autenticación más allá de la accesibilidad de red al lector en el dominio DDS. En entornos sin un límite de RSS (no-ASan / ilimitado), se observó que el consumo de memoria aumentaba a ~64 GB. Las versiones 3.4.1, 3.3.1 y 2.6.11 corrigen el problema.
CPE cpe:2.3:a:eprosima:fast_dds:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Eprosima
Eprosima fast Dds

03 Feb 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 20:15

Updated : 2026-02-18 16:02


NVD link : CVE-2025-64438

Mitre link : CVE-2025-64438

CVE.ORG link : CVE-2025-64438


JSON object : View

Products Affected

eprosima

  • fast_dds
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')