An attacker can arbitrarily craft malicious DDS...
High severity
Unreviewed
Published
Jan 9, 2025
to the GitHub Advisory Database
•
Updated Jan 9, 2025
Description
Published by the National Vulnerability Database
Jan 9, 2025
Published to the GitHub Advisory Database
Jan 9, 2025
Last updated
Jan 9, 2025
An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
References