CVE-2025-4993

9.1 CRITICAL

📋 TL;DR

CVE-2025-4993 is an untrusted pointer dereference vulnerability in RTI Connext Professional Core Libraries that allows attackers to manipulate pointers, potentially leading to memory corruption. This affects RTI Connext Professional versions across multiple major releases from 4.4a through 7.6.0. Systems using vulnerable versions for real-time data distribution are at risk.

💻 Affected Systems

Products:
  • RTI Connext Professional
Versions: From 7.4.0 before 7.6.0, from 7.0.0 before 7.3.0.10, from 6.1.0 before 6.1.2.27, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.*, from 4.4a before 5.2.*
Operating Systems: All supported platforms where RTI Connext Professional runs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the core libraries used by Connext Professional applications. Any application built with vulnerable libraries is affected regardless of specific configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or service disruption in critical real-time systems.

🟠

Likely Case

Denial of service through application crashes or memory corruption, potentially disrupting real-time data flows in industrial or embedded systems.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege are enforced, though service disruption remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Pointer manipulation vulnerabilities typically require some understanding of the target system's memory layout but can be exploited via network input to vulnerable services.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0, 7.3.0.10, 6.1.2.27, and later versions for respective branches

Vendor Advisory: https://www.rti.com/vulnerabilities/#cve-2025-4993

Restart Required: Yes

Instructions:

1. Identify affected Connext Professional installations. 2. Download and install the patched version from RTI support portal. 3. Rebuild and redeploy applications using the updated libraries. 4. Restart all Connext services and applications.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connext systems from untrusted networks to limit attack surface

Application Firewall Rules

all

Restrict network access to Connext DDS ports (typically 7400-7500 and others)

iptables -A INPUT -p tcp --dport 7400:7500 -j DROP
netsh advfirewall firewall add rule name="Block Connext Ports" dir=in action=block protocol=TCP localport=7400-7500

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with Connext services
  • Monitor systems for abnormal memory usage or crashes that might indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Connext Professional version using rti_versions command or examine library files

Check Version:

rti_versions or check RTI Connext installation directory for version information

Verify Fix Applied:

Verify installed version matches patched versions (7.6.0+, 7.3.0.10+, 6.1.2.27+, or later appropriate branch)

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected termination of Connext services
  • Abnormal memory usage patterns in system logs

Network Indicators:

  • Unusual traffic patterns to Connext DDS ports (7400-7500)
  • Malformed DDS packets from unexpected sources

SIEM Query:

source="*connext*" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export