CVE-2024-52065

7.1 HIGH

📋 TL;DR

A buffer overflow vulnerability in RTI Connext Professional's Persistence Service on non-Windows systems allows attackers to execute arbitrary code or cause denial of service by manipulating environment variables. This affects users running vulnerable versions of Connext Professional on Linux, Unix, or other non-Windows platforms. The vulnerability is particularly dangerous because it can be exploited without authentication.

💻 Affected Systems

Products:
  • RTI Connext Professional
Versions: From 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41
Operating Systems: Linux, Unix, macOS, Other non-Windows platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Persistence Service component on non-Windows platforms. Windows versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Denial of service through service crashes, with potential for limited code execution in constrained environments.

🟢

If Mitigated

Service disruption without code execution if memory protections like ASLR are effective.

🌐 Internet-Facing: MEDIUM - While the service may be internet-facing in some deployments, exploitation requires specific conditions and knowledge of the environment.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this easily to move laterally within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires ability to set environment variables on the target system, which can be achieved through various attack vectors including compromised applications or malicious scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.0.2, 6.1.2.21, or 5.3.1.41 depending on your version

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2024-52065

Restart Required: Yes

Instructions:

1. Identify your Connext Professional version. 2. Download appropriate patch from RTI support portal. 3. Stop all Connext services. 4. Apply patch according to RTI documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Restrict Environment Variable Access

linux

Limit ability to set environment variables for Connext processes using system controls

# Use SELinux/AppArmor to restrict environment variable manipulation
# Example: setenforce 1 for SELinux enforcing mode
# Configure process isolation with containers or namespaces

Disable Persistence Service

linux

Temporarily disable the vulnerable Persistence Service if not required

sudo systemctl stop rti-persistence-service
# Or kill process: pkill -f 'rti.*persistence'

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Connext systems from untrusted networks
  • Deploy host-based intrusion detection and monitor for unusual process creation or memory patterns

🔍 How to Verify

Check if Vulnerable:

Check Connext Professional version and verify if running on non-Windows OS with Persistence Service enabled

Check Version:

rtiddsgen -version 2>&1 | grep -i version

Verify Fix Applied:

Verify version is 7.3.0.2 or higher, 6.1.2.21 or higher, or 5.3.1.41 or higher depending on your major version

📡 Detection & Monitoring

Log Indicators:

  • Unusual process crashes of rti-persistence-service
  • Memory access violation errors in system logs
  • Unexpected child process creation from Connext services

Network Indicators:

  • Unusual network connections from Connext processes
  • Traffic patterns suggesting buffer overflow attempts

SIEM Query:

process_name:"rti-persistence-service" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export