Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2hc6-xq49-vhg3

Опубликовано: 09 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.

EPSS

Процентиль: 34%
0.00134
Низкий

8.2 High

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 8.2
nvd
около 1 года назад

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.

EPSS

Процентиль: 34%
0.00134
Низкий

8.2 High

CVSS3

Дефекты

CWE-200