First published: Thu May 05 2022(Updated: )
RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rti Connext Dds Micro | >=2.4 | |
RTI Connext DDS Professional | >=4.2<6.1.0 | |
Rti Connext Dds Secure | >=4.2<6.1.0 | |
<0.8.0 | 0.8.0 | |
<2.4.0 | 2.4.0 | |
<3.18.1 | 3.18.1 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-38487 is critical, with a severity score of 9.1.
RTI Connext DDS Professional versions 4.2x to 6.1.0 and Connext DDS Secure versions 4.2x to 6.1.0 are affected by CVE-2021-38487.
RTI Connext DDS Micro versions 2.4 and later are affected by CVE-2021-38487.
CVE-2021-38487 can result in a denial-of-service condition and information exposure.
More information about CVE-2021-38487 can be found at the following references: [Link 1](https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F), [Link 2](https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02).