Loading HuntDB...

GHSA-8hqm-m28g-xwhx

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.

Related CVEs

Key Information

GHSA ID
GHSA-8hqm-m28g-xwhx
Published
January 9, 2025 3:31 PM
Last Modified
January 9, 2025 3:31 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.