Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-24879 | RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code. |
Solution
RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue.
Workaround
No workaround given by the vendor.
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rti connext Professional
Rti connext Secure |
|
CPEs | cpe:2.3:a:rti:connext_dds_secure:*:*:*:*:*:*:*:* |
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* cpe:2.3:a:rti:connext_secure:*:*:*:*:*:*:*:* |
Vendors & Products |
Rti connext Dds Professional
Rti connext Dds Secure |
Rti connext Professional
Rti connext Secure |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:23:03.124Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38427

Updated: 2024-08-04T01:44:22.264Z

Status : Modified
Published: 2022-05-05T17:15:09.147
Modified: 2025-02-05T13:26:20.443
Link: CVE-2021-38427

No data.

No data.