First published: Thu May 05 2022(Updated: )
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Objectcomputing Opendds | <3.18.1 | |
<0.8.0 | 0.8.0 | |
<2.4.0 | 2.4.0 | |
<3.18.1 | 3.18.1 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
OCI recommends users update to version 3.18.1 of OpenDDS or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38429 is a vulnerability in OCI OpenDDS versions prior to 3.18.1 that allows an attacker to flood target devices with unwanted traffic, leading to a denial-of-service condition and information exposure.
CVE-2021-38429 has a severity rating of 9.1 (critical).
OCI OpenDDS versions prior to 3.18.1 are affected by CVE-2021-38429.
An attacker can exploit CVE-2021-38429 by sending a specially crafted packet to flood target devices with unwanted traffic.
To mitigate CVE-2021-38429, it is recommended to update OCI OpenDDS to version 3.18.1 or later.