{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3753","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2025-04-16T22:19:19.339Z","datePublished":"2025-07-17T19:14:20.486Z","dateUpdated":"2025-07-18T08:05:27.171Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["rosbag"],"packageName":"rosbag","platforms":["Linux","Windows","MacOS"],"product":"Robot Operating System (ROS)","repo":"https://github.com/ros/ros_comm","vendor":"Open Source Robotics Foundation","versions":[{"version":"Noetic Ninjemys","status":"affected"},{"version":"Melodic Morenia","status":"affected"},{"version":"Kinetic Kame","status":"affected"},{"version":"Indigo Igloo","status":"affected"}]}],"credits":[{"lang":"en","type":"finder","value":"Giuseppe Barbieri, Ubuntu Robotics Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code."}],"value":"A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code."}],"solutions":[{"lang":"en","value":"All ROS (1) versions are EOL, upgrade to a ROS 2 version."}],"impacts":[{"capecId":"CAPEC-586","descriptions":[{"lang":"en","value":"CAPEC-586 Object Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-95","description":"CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"source":{"discovery":"INTERNAL"},"references":[{"tags":["product"],"url":"https://www.ros.org/blog/noetic-eol/"}],"title":"Unsafe use of eval() method in rosbag tool","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2025-07-18T08:05:27.171Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-17T20:38:16.660029Z","id":"CVE-2025-3753","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-17T20:38:23.594Z"}}]}}