First published: Thu May 05 2022(Updated: )
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Objectcomputing Opendds | <3.18.1 | |
<0.8.0 | 0.8.0 | |
<2.4.0 | 2.4.0 | |
<3.18.1 | 3.18.1 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
OCI recommends users update to version 3.18.1 of OpenDDS or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38447 is a vulnerability in OCI OpenDDS versions prior to 3.18.1 that allows an attacker to flood target devices with specially crafted packets, potentially causing a denial-of-service condition.
CVE-2021-38447 allows an attacker to send specially crafted packets to flood target devices, potentially resulting in a denial-of-service condition.
CVE-2021-38447 has a severity rating of high, with a score of 7.5.
To fix the CVE-2021-38447 vulnerability, it is recommended to upgrade to OCI OpenDDS version 3.18.1 or later.
More information about CVE-2021-38447 can be found at the official OpenDDS website (https://opendds.org/) and the CISA website (https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02).