CVE-2024-52060

7.8 HIGH

📋 TL;DR

This CVE describes a classic buffer overflow vulnerability in RTI Connext Professional services where environment variables can trigger buffer overflows without proper size checking. The vulnerability affects multiple services including Routing Service, Recording Service, Queuing Service, Observability Collector Service, and Cloud Discovery Service. Organizations running affected versions of RTI Connext Professional are at risk.

💻 Affected Systems

Products:
  • RTI Connext Professional Routing Service
  • RTI Connext Professional Recording Service
  • RTI Connext Professional Queuing Service
  • RTI Connext Professional Observability Collector Service
  • RTI Connext Professional Cloud Discovery Service
Versions: From 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45
Operating Systems: All supported platforms where RTI Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: All affected services are vulnerable when using environment variables, which is common in many deployment scenarios.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, service disruption, and potential lateral movement within the network.

🟠

Likely Case

Service crashes leading to denial of service, potential information disclosure, or limited code execution depending on exploit sophistication.

🟢

If Mitigated

Service disruption with limited impact if proper network segmentation and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer overflow via environment variables typically requires some knowledge of the target system's memory layout and environment configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.0.5, 6.1.2.21, 5.3.1.45 (6.0.x versions require upgrade as no patch available)

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52060

Restart Required: Yes

Instructions:

1. Download the patched version from RTI support portal. 2. Backup current configuration and data. 3. Stop all affected services. 4. Install the patched version. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Environment Variable Sanitization

all

Remove or sanitize environment variables passed to affected services

export RTI_ENV_VAR=""
unset RTI_ENV_VAR

Service Isolation

linux

Run affected services with minimal environment variables and reduced privileges

systemctl set-environment RTI_SERVICE_ENV=""
sudo -u lowprivuser rti-service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected services from untrusted networks
  • Apply principle of least privilege and run services with minimal environment variables

🔍 How to Verify

Check if Vulnerable:

Check RTI Connext Professional version using 'rtiddsgen -version' or check service logs for version information

Check Version:

rtiddsgen -version

Verify Fix Applied:

Verify installed version matches patched versions (7.3.0.5, 6.1.2.21, or 5.3.1.45) and test with controlled environment variable inputs

📡 Detection & Monitoring

Log Indicators:

  • Service crashes with segmentation faults
  • Abnormal termination of RTI services
  • Memory access violation errors in logs

Network Indicators:

  • Unexpected service restarts
  • Increased network traffic to affected services followed by service unavailability

SIEM Query:

source="rti_logs" AND ("segmentation fault" OR "buffer overflow" OR "access violation")

🔗 References

📤 Share & Export