CVE-2025-24807
Published: 11 February 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2025-24807 affects eProsima Fast DDS, a C++ implementation of the OMG Data Distribution Service (DDS) standard. In versions prior to 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0, the access control plugin fails to perform full certificate chain validation or check expiration dates for PermissionsCA certificates. Instead, it only validates the S/MIME signature, allowing expired PermissionsCA certificates to be treated as valid. This issue, tied to CWE-345 (Insufficient Verification of Data Authenticity), carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
A local attacker with low privileges can exploit this vulnerability by supplying an expired PermissionsCA, enabling unauthorized governance or permissions access. Under specific conditions—such as a non-self-signed PermissionsCA with a full chain—the system may also crash. While the description notes low overall impact, successful exploitation compromises integrity and availability without affecting confidentiality.
The eProsima Fast DDS security advisory (GHSA-w33g-jmm2-8983) and associated pull request (#5530) detail the fix implemented in versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0, which add proper chain and expiration validation in components like Permissions.cpp and PKIDH.cpp. Security practitioners should prioritize upgrading affected deployments to these patched releases.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Local low-privileged attacker supplies expired PermissionsCA to bypass access control validation, directly enabling unauthorized permissions/governance access (privilege escalation); crash impact is secondary.