An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.
References
Configurations
No configuration.
History
No history.
Information
Published : 2025-01-09 15:15
Updated : 2025-01-09 16:15
NVD link : CVE-2023-24012
Mitre link : CVE-2023-24012
CVE.ORG link : CVE-2023-24012
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
