CVE-2024-52063

8.6 HIGH

📋 TL;DR

This CVE describes a classic buffer overflow vulnerability in RTI Connext Professional's Core Libraries and Routing Service. Attackers can exploit this to execute arbitrary code, potentially leading to full system compromise. Organizations using affected versions of RTI Connext Professional are at risk.

💻 Affected Systems

Products:
  • RTI Connext Professional Core Libraries
  • RTI Connext Professional Routing Service
Versions: From 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45
Operating Systems: All supported platforms where Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Core Libraries and Routing Service components. Systems using these libraries in custom applications are also vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data exfiltration, or deployment of ransomware across connected systems.

🟠

Likely Case

Denial of service, application crashes, or limited code execution within the Connext process context.

🟢

If Mitigated

Application crashes with no code execution if exploit attempts are blocked by security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer overflows typically require some knowledge of the target system but can be exploited remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.0.5, 6.1.2.21, 6.0.1.40, 5.3.1.45 or later

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52063

Restart Required: Yes

Instructions:

1. Identify your Connext Professional version. 2. Download the appropriate patched version from RTI's support portal. 3. Follow RTI's upgrade documentation for your specific deployment. 4. Restart all Connext services and applications.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connext systems from untrusted networks and internet exposure

Application Firewall Rules

all

Implement strict firewall rules to limit Connext traffic to trusted sources only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy intrusion prevention systems with buffer overflow detection rules

🔍 How to Verify

Check if Vulnerable:

Check Connext Professional version using the RTI version command or by examining installed packages

Check Version:

rtiddsgen -version (or check installed package version via system package manager)

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions listed in the fix section

📡 Detection & Monitoring

Log Indicators:

  • Application crashes
  • Memory access violation errors
  • Unusual process termination

Network Indicators:

  • Unusual network traffic patterns to Connext ports
  • Malformed packets targeting Connext services

SIEM Query:

source="connext" AND (event_type="crash" OR event_type="access_violation")

🔗 References

📤 Share & Export