{"api_version":"1","generated_at":"2026-04-23T10:20:38+00:00","cve":"CVE-2023-39949","urls":{"html":"https://cve.report/CVE-2023-39949","api":"https://cve.report/api/cve/CVE-2023-39949.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39949","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39949"},"summary":{"title":"CVE-2023-39949","description":"eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.9.1 and 2.6.5, improper validation of sequence numbers may lead to remotely reachable assertion failure. This can remotely crash any Fast-DDS process. Versions 2.9.1 and 2.6.5 contain a patch for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-11 14:15:00","updated_at":"2023-08-21 18:17:00"},"problem_types":["CWE-617"],"metrics":[],"references":[{"url":"https://github.com/eProsima/Fast-DDS/blob/v2.9.0/src/cpp/rtps/messages/MessageReceiver.cpp#L1059","name":"https://github.com/eProsima/Fast-DDS/blob/v2.9.0/src/cpp/rtps/messages/MessageReceiver.cpp#L1059","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg","name":"https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg","refsource":"MISC","tags":[],"title":"Improper validation of sequence numbers leading to remotely reachable assertion failure · Advisory · eProsima/Fast-DDS · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5481","name":"https://www.debian.org/security/2023/dsa-5481","refsource":"MISC","tags":[],"title":"Debian -- Security Information -- DSA-5481-1 fastdds","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/eProsima/Fast-DDS/issues/3236","name":"https://github.com/eProsima/Fast-DDS/issues/3236","refsource":"MISC","tags":[],"title":"Assertion failure in SequenceNumber.h via malformed SPDP packet only when compiled in logging-enabled (Debug) mode · Issue #3236 · eProsima/Fast-DDS · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39949","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39949","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39949","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"39949","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"39949","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eprosima","cpe5":"fast_dds","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"39949","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eprosima","cpe5":"fast_dds","cpe6":"2.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-39949","qid":"6000204","title":"Debian Security Update for fastdds (DSA 5481-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39949","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.9.1 and 2.6.5, improper validation of sequence numbers may lead to remotely reachable assertion failure. This can remotely crash any Fast-DDS process. Versions 2.9.1 and 2.6.5 contain a patch for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-617: Reachable Assertion","cweId":"CWE-617"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"eProsima","product":{"product_data":[{"product_name":"Fast-DDS","version":{"version_data":[{"version_affected":"=","version_value":">= 2.7.0, < 2.9.1"},{"version_affected":"=","version_value":"< 2.6.5"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg","refsource":"MISC","name":"https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg"},{"url":"https://github.com/eProsima/Fast-DDS/issues/3236","refsource":"MISC","name":"https://github.com/eProsima/Fast-DDS/issues/3236"},{"url":"https://github.com/eProsima/Fast-DDS/blob/v2.9.0/src/cpp/rtps/messages/MessageReceiver.cpp#L1059","refsource":"MISC","name":"https://github.com/eProsima/Fast-DDS/blob/v2.9.0/src/cpp/rtps/messages/MessageReceiver.cpp#L1059"},{"url":"https://www.debian.org/security/2023/dsa-5481","refsource":"MISC","name":"https://www.debian.org/security/2023/dsa-5481"}]},"source":{"advisory":"GHSA-3jv9-j9x3-95cg","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-11 14:15:00","lastModifiedDate":"2023-08-21 18:17:00","problem_types":["CWE-617"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.0","versionEndExcluding":"2.6.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eprosima:fast_dds:2.9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}