CVE-2025-10450

7.5 HIGH

📋 TL;DR

CVE-2025-10450 is an exposure of private personal information vulnerability in RTI Connext Professional Core Libraries that allows unauthorized actors to sniff network traffic containing sensitive data. This affects Connext Professional versions from 7.4.0 before 7.* and from 7.2.0 before 7.3.1, potentially exposing any personal information transmitted via these libraries.

💻 Affected Systems

Products:
  • RTI Connext Professional Core Libraries
Versions: from 7.4.0 before 7.* and from 7.2.0 before 7.3.1
Operating Systems: All platforms running affected Connext versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any system using vulnerable Connext libraries for data distribution, regardless of application implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all personal identifiable information (PII) transmitted through affected systems, leading to identity theft, regulatory violations, and reputational damage.

🟠

Likely Case

Partial exposure of sensitive data in transit, potentially including user credentials, personal details, or proprietary information that could be used for further attacks.

🟢

If Mitigated

Limited data exposure with encryption bypassed only for specific traffic patterns, still potentially revealing metadata or partial information.

🌐 Internet-Facing: HIGH - Network traffic can be intercepted from any network path between communicating systems, including internet transit.
🏢 Internal Only: HIGH - Even internal network traffic is vulnerable to sniffing by compromised internal systems or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Network sniffing requires only access to network traffic path.

Exploitation requires network access to traffic path; no authentication or special privileges needed to intercept data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.1 and later 7.* versions

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2025-10450

Restart Required: Yes

Instructions:

1. Download latest patched version from RTI support portal. 2. Stop all Connext applications. 3. Install updated libraries. 4. Restart applications with patched libraries.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connext traffic to trusted network segments to limit exposure.

Application Layer Encryption

all

Implement additional encryption at application level before Connext transmission.

🧯 If You Can't Patch

  • Implement network-level encryption (IPsec, VPN) for all Connext traffic
  • Restrict Connext communications to physically isolated or highly controlled network segments

🔍 How to Verify

Check if Vulnerable:

Check Connext library version using RTI version utilities or examine installed package versions.

Check Version:

rtiddsgen -version or check installed package (rpm -qa | grep rti-connext or equivalent)

Verify Fix Applied:

Verify installed Connext version is 7.3.1 or later 7.* versions, and test network traffic encryption.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic patterns
  • Failed encryption handshakes
  • Unexpected data access attempts

Network Indicators:

  • Unencrypted Connext DDS traffic on network
  • Suspicious packet capture activity on Connext ports

SIEM Query:

network_traffic.protocol:dds AND NOT encryption:true OR network_traffic.application:connext AND data_exfiltration_detected

🔗 References

📤 Share & Export