CVE-2025-1254

7.4 HIGH

📋 TL;DR

This vulnerability in RTI Connext Professional Recording Service allows attackers to read or write data outside intended memory buffers, potentially leading to information disclosure or system compromise. It affects multiple versions of RTI Connext Professional software. Organizations using vulnerable versions of this real-time data distribution middleware are at risk.

💻 Affected Systems

Products:
  • RTI Connext Professional Recording Service
Versions: Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42
Operating Systems: All supported platforms where Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: Recording Service component specifically affected; other Connext components may not be vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or service disruption of critical real-time systems.

🟠

Likely Case

Service disruption through denial of service, potential information disclosure from memory reads, or limited system compromise.

🟢

If Mitigated

Contained impact with proper network segmentation and least privilege, potentially limited to service restart or minor disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities often lead to weaponization; no public exploit available yet but likely to be developed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Upgrade to Connext Professional 7.5.0, 7.3.0.7, 6.1.2.23, or 6.0.1.42 depending on your version

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2025-1254

Restart Required: Yes

Instructions:

1. Identify current Connext Professional version. 2. Download appropriate patched version from RTI support portal. 3. Backup configuration and data. 4. Install update following RTI documentation. 5. Restart Recording Service and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Recording Service to only trusted systems

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port port="7400" protocol="tcp" accept'
netsh advfirewall firewall add rule name="RTI Recording Service" dir=in action=allow protocol=TCP localport=7400 remoteip=TRUSTED_IP

Service Hardening

linux

Run Recording Service with minimal privileges and enable memory protection

setcap 'cap_net_bind_service=+ep' /path/to/rti_recording_service
edit /etc/systemd/system/rti-recording.service to add MemoryDenyWriteExecute=true

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Recording Service from untrusted networks
  • Deploy application-level firewalls or WAF with buffer overflow protection rules

🔍 How to Verify

Check if Vulnerable:

Check Connext Professional version against affected ranges; examine Recording Service logs for abnormal memory access patterns

Check Version:

rtiddsgen -version | grep "Connext Professional"

Verify Fix Applied:

Verify installed version matches patched versions; test Recording Service functionality; monitor for crash or memory errors

📡 Detection & Monitoring

Log Indicators:

  • Recording Service crash logs
  • Memory access violation errors in system logs
  • Abnormal process termination

Network Indicators:

  • Unusual traffic patterns to Recording Service port (default 7400)
  • Malformed DDS packets

SIEM Query:

source="*rti*" AND (event_type="crash" OR message="*segmentation fault*" OR message="*access violation*")

🔗 References

📤 Share & Export