Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-24885 | RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code. |
Solution
RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue.
Workaround
No workaround given by the vendor.
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rti connext Professional
Rti connext Secure |
|
CPEs | cpe:2.3:a:rti:connext_dds_secure:*:*:*:*:*:*:*:* |
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* cpe:2.3:a:rti:connext_secure:*:*:*:*:*:*:*:* |
Vendors & Products |
Rti connext Dds Professional
Rti connext Dds Secure |
Rti connext Professional
Rti connext Secure |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:22:48.159Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38433

Updated: 2024-08-04T01:44:22.371Z

Status : Modified
Published: 2022-05-05T17:15:09.303
Modified: 2025-02-05T13:26:20.443
Link: CVE-2021-38433

No data.

No data.