CVE-2025-4582

7.1 HIGH

📋 TL;DR

A buffer over-read and off-by-one error vulnerability in RTI Connext Professional Core Libraries allows attackers to read beyond allocated memory boundaries. This can lead to information disclosure or file manipulation. Affected users include those running vulnerable versions of RTI Connext Professional software.

💻 Affected Systems

Products:
  • RTI Connext Professional Core Libraries
Versions: From 7.4.0 before 7.6.0, from 7.0.0 before 7.3.0.8, from 6.1.0 before 6.1.2.26, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.*, from 4.4a before 5.2.*
Operating Systems: All supported platforms where RTI Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using vulnerable versions are affected. The vulnerability is in the core libraries used by various RTI Connext Professional components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive data from adjacent memory, potentially exposing credentials, configuration data, or other sensitive information, leading to further system compromise.

🟠

Likely Case

Information disclosure through memory reading, potentially revealing internal system data or application state.

🟢

If Mitigated

Limited impact with proper memory protection controls and network segmentation in place.

🌐 Internet-Facing: MEDIUM - While exploitation requires specific conditions, internet-facing systems could be targeted for information gathering.
🏢 Internal Only: MEDIUM - Internal systems could be exploited by authenticated users or through lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and knowledge of the target system. No public exploits are currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0, 7.3.0.8, 6.1.2.26, or later versions in respective branches

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2025-4582

Restart Required: Yes

Instructions:

1. Identify current RTI Connext Professional version. 2. Download appropriate patched version from RTI support portal. 3. Follow RTI's upgrade documentation for your specific deployment. 4. Restart all affected services and applications.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate RTI Connext Professional systems from untrusted networks and limit access to authorized users only.

Memory Protection Controls

all

Enable ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) where supported by the operating system.

# Linux: Check ASLR status with 'cat /proc/sys/kernel/randomize_va_space'
# Windows: Configure DEP through System Properties > Advanced > Performance Settings

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor systems for unusual memory access patterns or crashes

🔍 How to Verify

Check if Vulnerable:

Check RTI Connext Professional version against affected version ranges. Use RTI's diagnostic tools or check installation directories for version information.

Check Version:

# Check RTI version typically via: rticonnextdds-version or check installation directory version files

Verify Fix Applied:

Verify installed version is 7.6.0 or higher, 7.3.0.8 or higher, 6.1.2.26 or higher, or appropriate patched version for your branch.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal termination
  • Memory access violation errors in system logs
  • Unusual file access patterns

Network Indicators:

  • Unusual network traffic to RTI Connext Professional ports
  • Connection attempts from unexpected sources

SIEM Query:

source="*rti*" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export