eProsima Fast DDS vulnerability allows remote attackers to forcibly disconnect Subscribers and deny new connections by sending unencrypted data packets to the Global Data Space
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 19 Feb 202420:15 | – | prion |
![]() | CVE-2023-50257 Disconnect Vulnerability in RTPS Packets Used by SROS2 | 19 Feb 202419:22 | – | vulnrichment |
![]() | CVE-2023-50257 | 19 Feb 202400:00 | – | ubuntucve |
![]() | Linux Distros Unpatched Vulnerability : CVE-2023-50257 | 5 Mar 202500:00 | – | nessus |
![]() | CVE-2023-50257 | 19 Feb 202420:15 | – | osv |
![]() | CVE-2023-50257 | 19 Feb 202420:15 | – | debiancve |
![]() | CVE-2023-50257 Disconnect Vulnerability in RTPS Packets Used by SROS2 | 19 Feb 202419:22 | – | cvelist |
![]() | CVE-2023-50257 | 19 Feb 202420:15 | – | nvd |
[
{
"vendor": "eProsima",
"product": "Fast-DDS",
"versions": [
{
"version": ">= 2.12.0, < 2.12.2",
"status": "affected"
},
{
"version": ">= 2.11.0, < 2.11.3",
"status": "affected"
},
{
"version": ">= 2.7.0, < 2.10.3",
"status": "affected"
},
{
"version": "< 2.6.7",
"status": "affected"
},
{
"version": "FastDDS = 2.10.2-2",
"status": "affected"
},
{
"version": "RMW - FastDDS = 7.1.1-2",
"status": "affected"
},
{
"version": "FastDDS = 2.6.6-1",
"status": "affected"
},
{
"version": "RMW - FastDDS = 6.2.3.1",
"status": "affected"
},
{
"version": "FastDDS = 2.3.6-6",
"status": "affected"
},
{
"version": "RMW - FastDDS = 5.0.2-1",
"status": "affected"
},
{
"version": "FastDDS = 2.1.4-1",
"status": "affected"
},
{
"version": "RMW - FastDDS = 1.3.2-1",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo