Description
Improper Restriction of XML External Entity Reference vulnerability in RTI Connext Professional (Routing Service,Observability Collector,Recording Service,Queueing Service,Cloud Discovery Service) allows Serialized Data External Linking, Data Serializat...
Published: 2026-04-01
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential for unauthorized data exposure or remote code execution via XML External Entity processing
Action: Immediate Patch
AI Analysis

Impact

RTI Connext Professional—including Routing Service, Observability Collector, Recording Service, Queueing Service, and Cloud Discovery Service—contains an improper restriction of XML External Entity (XXE) references. This flaw enables the processing of serialized data that can reference external XML entities. If an attacker supplies crafted XML, the affected components may read local files, access network resources, or execute code embedded in external entities, leading to data exfiltration or, in worst cases, arbitrary code execution.

Affected Systems

The vulnerability affects the RTI Connext Professional product suite, specifically its Routing Service, Observability Collector, Recording Service, Queueing Service, and Cloud Discovery Service. No specific version information is provided; all released versions under the Connext Professional portfolio are potentially impacted until a patch is issued.

Risk and Exploitability

The CVSS v3.1 score is 7.0, indicating a high impact severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, suggesting current exploit evidence may be limited. However, the attack vector is inferred to be remote through untrusted XML input, meaning an attacker could remotely inject malicious XML payloads to trigger the vulnerability. Given the nature of XXE weaknesses and the high CVSS, the risk to affected systems remains significant until mitigated.

Generated by OpenCVE AI on April 1, 2026 at 06:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-provided patch when it becomes available
  • Disable XML external entity processing in all RTI Connext components if configuration options allow
  • Implement strict validation of XML inputs to reject or sanitize external entity references
  • Monitor system logs for suspicious XML parsing activity
  • Regularly check the RTI security advisory page for updates and new mitigations

Generated by OpenCVE AI on April 1, 2026 at 06:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description Improper Restriction of XML External Entity Reference vulnerability in RTI Connext Professional (Routing Service,Observability Collector,Recording Service,Queueing Service,Cloud Discovery Service) allows Serialized Data External Linking, Data Serializat...
Title Improper Restriction of XML External Entity Reference vulnerability in RTI Connext Professional (Routing Service,Observability Collector,Recording Service,Queueing Service,Cloud Discovery Service) allows Serialized Data External Linking, Data Serializat...
First Time appeared Rti
Rti connext Professional
Weaknesses CWE-611
CPEs cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
Vendors & Products Rti
Rti connext Professional
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Rti Connext Professional
cve-icon MITRE

Status: PUBLISHED

Assigner: RTI

Published:

Updated: 2026-04-01T15:51:42.809Z

Reserved: 2026-03-18T10:48:52.263Z

Link: CVE-2026-4374

cve-icon Vulnrichment

Updated: 2026-04-01T14:23:36.981Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T02:16:03.540

Modified: 2026-04-21T00:06:11.200

Link: CVE-2026-4374

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:18:36Z

Weaknesses