{"id":"CVE-2023-24010","details":"An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.","modified":"2026-03-14T12:02:31.531195Z","published":"2025-01-09T15:15:11.467Z","references":[{"type":"WEB","url":"https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d"},{"type":"REPORT","url":"https://github.com/ros2/sros2/issues/282"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-24010.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L"}]}