CVE-2024-52061

9.8 CRITICAL

📋 TL;DR

This CVE describes a classic buffer overflow vulnerability in RTI Connext Professional components (Core Libraries, Queuing Service, Recording Service, Routing Service) that allows attackers to overflow variables and tags. It affects multiple versions of RTI Connext Professional from 5.0.0 through 7.4.0. With a CVSS score of 9.8, this is a critical vulnerability that could lead to remote code execution.

💻 Affected Systems

Products:
  • RTI Connext Professional Core Libraries
  • RTI Connext Professional Queuing Service
  • RTI Connext Professional Recording Service
  • RTI Connext Professional Routing Service
Versions: From 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45
Operating Systems: All supported platforms where RTI Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configurations are vulnerable. The vulnerability exists in multiple services/components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to execute arbitrary code, steal data, or deploy ransomware.

🟠

Likely Case

Denial of service through service crashes or potential remote code execution in vulnerable configurations.

🟢

If Mitigated

Service disruption or crashes without code execution if memory protections are enabled.

🌐 Internet-Facing: HIGH - Buffer overflows in network services can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to network-based attacks from compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Classic buffer overflows are well-understood attack vectors. While no public PoC exists, the vulnerability type suggests exploitation is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.0, 7.3.0.5, 6.1.2.21, 6.0.1.40, 5.3.1.45 or later

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52061

Restart Required: Yes

Instructions:

1. Identify your current RTI Connext Professional version. 2. Download the appropriate patched version from RTI support portal. 3. Stop all Connext services. 4. Install the update following RTI documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connext services from untrusted networks and limit access to trusted hosts only.

Memory Protection Controls

all

Enable ASLR, DEP, and other memory protection mechanisms if supported by your OS.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with Connext services
  • Monitor for unusual process behavior, memory usage spikes, or service crashes that could indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check RTI Connext Professional version using the RTI version command or package manager. Compare against affected version ranges.

Check Version:

rtiddsgen -version or check installed package version via system package manager

Verify Fix Applied:

Verify installed version matches patched versions: 7.5.0+, 7.3.0.5+, 6.1.2.21+, 6.0.1.40+, or 5.3.1.45+.

📡 Detection & Monitoring

Log Indicators:

  • Service crashes or restarts
  • Memory access violation errors
  • Unusual process spawning from Connext services

Network Indicators:

  • Unusual network traffic patterns to Connext service ports
  • Connection attempts from unexpected sources

SIEM Query:

Process: (rti OR connext) AND (EventCode: 1000 OR "access violation" OR "segmentation fault")

🔗 References

📤 Share & Export