An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
{
"binaries": [
{
"binary_version": "3.1.2+ds-1build1",
"binary_name": "fastdds-tools"
},
{
"binary_version": "3.1.2+ds-1build1",
"binary_name": "libfastdds-dev"
},
{
"binary_version": "3.1.2+ds-1build1",
"binary_name": "libfastdds3.1"
},
{
"binary_version": "3.1.2+ds-1build1",
"binary_name": "libfastrtps-dev"
}
]
}
{
"binaries": [
{
"binary_version": "3.1.2+ds-1",
"binary_name": "fastdds-tools"
},
{
"binary_version": "3.1.2+ds-1",
"binary_name": "libfastdds-dev"
},
{
"binary_version": "3.1.2+ds-1",
"binary_name": "libfastdds3.1"
},
{
"binary_version": "3.1.2+ds-1",
"binary_name": "libfastrtps-dev"
}
]
}