CVE-2024-52057

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in RTI Connext Professional's Queuing Service allows attackers to execute arbitrary SQL commands by injecting malicious input. It affects all users running vulnerable versions of RTI Connext Professional software. Successful exploitation could lead to data theft, manipulation, or complete system compromise.

💻 Affected Systems

Products:
  • RTI Connext Professional
Versions: 7.0.0 to 7.3.0 (exclusive), 6.1.0 to 6.1.2.17 (exclusive), 6.0.0 to 6.0.* (exclusive), 5.2.0 to 5.3.* (exclusive)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Queuing Service component. All deployments using vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, data destruction, or remote code execution on the underlying database server.

🟠

Likely Case

Unauthorized data access, data manipulation, or privilege escalation within the database.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity. The vulnerability is in the Queuing Service which may be exposed to network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.0 or later, 6.1.2.17 or later

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52057

Restart Required: Yes

Instructions:

1. Download the patched version from RTI's official website. 2. Stop all Connext Professional services. 3. Install the updated version. 4. Restart all services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Queuing Service to only trusted hosts and networks.

Input Validation

all

Implement application-level input validation for all user-supplied data before processing by the Queuing Service.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of the Queuing Service
  • Deploy a web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check the installed version of RTI Connext Professional against the affected version ranges.

Check Version:

rtiddsgen -version (or check the installation directory for version files)

Verify Fix Applied:

Verify the installed version is 7.3.0 or later, or 6.1.2.17 or later, and test SQL injection attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts
  • Unexpected database schema changes

Network Indicators:

  • Unusual SQL syntax in network traffic to Queuing Service port
  • Multiple rapid connection attempts

SIEM Query:

source="connext.log" AND ("sql" OR "query") AND ("error" OR "exception" OR "malformed")

🔗 References

📤 Share & Export