Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-64438

CVE-2025-64438: Fast DDS Out-of-Memory DoS Vulnerability

CVE-2025-64438 is an Out-of-Memory denial-of-service vulnerability in Fast DDS that allows remote attackers to crash processes via malicious RTPS GAP packets. This article covers technical details, affected versions, and patches.

Published: February 6, 2026

CVE-2025-64438 Overview

CVE-2025-64438 is a remotely triggerable Out-of-Memory (OOM) denial-of-service vulnerability in Fast DDS, a C++ implementation of the DDS (Data Distribution Service) standard from eProsima. The vulnerability exists in the RTPS GAP submessage processing under RELIABLE QoS configurations. By sending a specially crafted GAP packet with an extremely large gap range, an unauthenticated attacker can cause unbounded memory allocation, leading to process termination.

The vulnerability is classified as CWE-835 (Loop with Unreachable Exit Condition), as the StatefulReader::processGapMsg() function enters an unbounded loop when processing malicious GAP submessages. This loop inserts millions of sequence numbers into the WriterProxy::changes_received_ data structure (implemented as a std::set), causing multi-gigabyte heap growth that can exhaust available system memory.

Critical Impact

Unauthenticated remote attackers can crash Fast DDS applications by sending a single malicious RTPS GAP packet, causing memory exhaustion up to ~64 GB in environments without RSS limits.

Affected Products

  • Fast DDS versions prior to 3.4.1
  • Fast DDS versions prior to 3.3.1
  • Fast DDS versions prior to 2.6.11

Discovery Timeline

  • 2026-02-03 - CVE-2025-64438 published to NVD
  • 2026-02-04 - Last updated in NVD database

Technical Details for CVE-2025-64438

Vulnerability Analysis

The vulnerability resides in the RTPS (Real-Time Publish-Subscribe) protocol implementation within Fast DDS. When a StatefulReader receives a GAP submessage, it processes the gap range specified by gapStart and gapList.base(). The vulnerable code iterates through all sequence numbers in this range without any bounds checking or limit enforcement.

An attacker can craft a minimal GAP packet specifying an enormous gap range (the difference between gapList.base and gapStart). This causes the processGapMsg() function to loop through potentially billions of sequence numbers, calling irrelevant_change_set() for each iteration. Each call inserts an entry into the changes_received_ set, causing continuous heap allocation until the system runs out of memory.

The attack requires no authentication beyond network reachability to the DDS reader on the target DDS domain, making it particularly dangerous in networked environments where DDS is used for real-time data distribution.

Root Cause

The root cause is the absence of input validation on the gap range size in RTPS GAP submessage processing. The vulnerable code directly uses attacker-controlled values (gapStart and gapList.base()) to determine the iteration count of a loop without verifying that the resulting range is reasonable. This allows an attacker to specify an arbitrarily large range with minimal packet overhead, triggering excessive memory allocation in a tight loop with no exit condition other than completing all iterations.

Attack Vector

The attack can be executed remotely over the network by any entity with network connectivity to a Fast DDS endpoint:

  1. Attacker identifies a DDS domain with Fast DDS readers configured with RELIABLE QoS
  2. Attacker crafts a malicious RTPS GAP submessage with a minimal gapStart and a very large gapList.base value
  3. The single small packet is sent to the target reader endpoint
  4. The vulnerable StatefulReader::processGapMsg() function processes the GAP and enters the unbounded loop
  5. Memory consumption grows rapidly as sequence numbers are inserted into the std::set
  6. The target process is terminated due to OOM conditions or system instability occurs
cpp
// Vulnerable code pattern (before patch) in StatefulReader.cpp
// The loop iterates from gapStart to gapList.base() without bounds checking

if (acceptMsgFrom(writerGUID, &pWP) && pWP)
{
    // TODO (Miguel C): Refactor this inside WriterProxy
    SequenceNumber_t auxSN;
    SequenceNumber_t finalSN = gapList.base();
    History::const_iterator history_iterator = history_->changesBegin();
    for (auxSN = gapStart; auxSN < finalSN; auxSN++)
    {
        if (pWP->irrelevant_change_set(auxSN))
        {
            CacheChange_t* to_remove = nullptr;
            auto ret_iterator = find_cache_in_fragmented_process(auxSN, pWP->guid(), to_remove, history_iterator);
            if (to_remove != nullptr)
            {
                // we called the History version to avoid callbacks
                history_iterator = history_->History::remove_change_nts(ret_iterator);
            }
            else if (ret_iterator != history_->changesEnd())
            {
                history_iterator = ret_iterator;
            }
        }
    }
    // ... additional vulnerable loop via gapList.for_each()
}

Source: GitHub Fast-DDS Commit

Detection Methods for CVE-2025-64438

Indicators of Compromise

  • Sudden and rapid memory consumption growth in Fast DDS application processes
  • Process crashes or OOM killer terminations of DDS-related services
  • Anomalous RTPS GAP submessages with unusually large sequence number ranges in network traffic
  • System log entries indicating memory allocation failures or OOM conditions for DDS processes

Detection Strategies

  • Monitor memory usage patterns for Fast DDS processes and alert on abnormal growth rates
  • Implement network-level inspection for RTPS traffic to detect GAP submessages with suspicious gap ranges
  • Deploy application-level logging to capture GAP submessage processing statistics and flag outliers
  • Configure system resource limits (ulimit, cgroups) to detect and contain memory exhaustion attempts

Monitoring Recommendations

  • Set up memory usage thresholds and alerts for all Fast DDS application processes
  • Enable DDS domain traffic capture and analysis for anomaly detection in RTPS protocol messages
  • Monitor system logs for OOM killer activity targeting DDS-related processes
  • Implement network flow analysis to identify potential DoS attack patterns targeting DDS endpoints

How to Mitigate CVE-2025-64438

Immediate Actions Required

  • Upgrade Fast DDS to patched versions: 3.4.1, 3.3.1, or 2.6.11 depending on your branch
  • Implement network segmentation to restrict access to DDS domain endpoints from untrusted networks
  • Configure process resource limits (RSS limits) to prevent system-wide impact from memory exhaustion
  • Monitor Fast DDS processes for anomalous memory consumption patterns

Patch Information

eProsima has released security patches for CVE-2025-64438 in Fast DDS versions 3.4.1, 3.3.1, and 2.6.11. The fix refactors the GAP message processing logic to eliminate the unbounded loop. Instead of iterating through each sequence number individually, the patched code uses a more efficient callback-based approach that prevents excessive memory allocation.

The patches are available through the following commits:

  • Patch for version 3.4.x branch
  • Patch for version 3.3.x branch
  • Patch for version 2.6.x branch

Additional tracking information is available at the Debian CVE-2025-64438 Tracker.

Workarounds

  • Restrict network access to DDS domain participants using firewall rules or network ACLs
  • Implement process-level memory limits using ulimit -v or cgroups to contain memory exhaustion impact
  • Deploy DDS over secure transport with authentication to reduce unauthenticated attack surface
  • Consider using BEST_EFFORT QoS instead of RELIABLE where application requirements permit (vulnerability affects RELIABLE QoS)
bash
# Configuration example - Set memory limits for Fast DDS processes

# Using ulimit to restrict virtual memory (in KB)
ulimit -v 4194304  # Limit to 4GB virtual memory

# Using cgroups for container-based deployments
# Create a cgroup with memory limit
cgcreate -g memory:/fastdds_limited
echo "4294967296" > /sys/fs/cgroup/memory/fastdds_limited/memory.limit_in_bytes

# Run Fast DDS application within the cgroup
cgexec -g memory:fastdds_limited ./your_dds_application

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechFast Dds

  • SeverityLOW

  • CVSS Score1.7

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-835
  • Technical References
  • GitHub Fast-DDS Commit

  • GitHub Fast-DDS Commit

  • GitHub Fast-DDS Commit

  • Debian CVE-2025-64438 Tracker
  • Related CVEs
  • CVE-2025-62599: Fast DDS DoS Vulnerability

  • CVE-2025-62603: Fast DDS DoS Vulnerability

  • CVE-2025-62600: Fast DDS DoS Vulnerability

  • CVE-2025-64098: Fast DDS DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English