CVE-2024-52058

7.8 HIGH

📋 TL;DR

This OS command injection vulnerability in RTI Connext Professional's System Designer allows attackers to execute arbitrary operating system commands on affected systems. It affects users running vulnerable versions of RTI Connext Professional software. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • RTI Connext Professional (System Designer)
Versions: From 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.19
Operating Systems: All supported platforms where Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the System Designer component specifically; other Connext components may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator privileges, data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to data theft, system manipulation, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege configurations, and proper input validation controls.

🌐 Internet-Facing: HIGH if System Designer is exposed to untrusted networks, as OS command injection can lead to immediate system compromise.
🏢 Internal Only: MEDIUM to HIGH depending on internal network segmentation and user privileges, as authenticated users could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

OS command injection vulnerabilities typically have low exploitation complexity once the injection vector is identified. Requires some level of access to the System Designer interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.0.2 or 6.1.2.19 and later

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52058

Restart Required: Yes

Instructions:

1. Download the patched version (7.3.0.2 or 6.1.2.19+) from RTI's official website. 2. Backup current configuration and data. 3. Install the update following RTI's installation guide. 4. Restart the Connext Professional services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connext Professional systems from untrusted networks and limit access to authorized users only.

Input Validation Enhancement

all

Implement additional input validation and sanitization for user inputs in System Designer configurations.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the System Designer interface
  • Run Connext Professional with minimal necessary privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check the installed version of RTI Connext Professional using the version command or by examining installation directories.

Check Version:

rtiddsgen -version (or check the installation directory for version files)

Verify Fix Applied:

Verify the version is 7.3.0.2 or higher for 7.x branches, or 6.1.2.19 or higher for 6.x branches.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Unexpected process creation from Connext processes
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unusual outbound connections from Connext systems
  • Command and control traffic patterns

SIEM Query:

Process creation where parent process contains 'connext' or 'rti' AND command line contains suspicious characters like ;, |, &, $, (, )

🔗 References

📤 Share & Export