Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10450: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in RTI Connext Professional

0
High
VulnerabilityCVE-2025-10450cvecve-2025-10450cwe-359
Published: Tue Dec 16 2025 (12/16/2025, 16:09:30 UTC)
Source: CVE Database V5
Vendor/Project: RTI
Product: Connext Professional

Description

CVE-2025-10450 is a high-severity vulnerability in RTI Connext Professional Core Libraries that allows unauthorized actors to sniff network traffic, leading to exposure of private personal information. It affects versions from 7. 2. 0 before 7. 3. 1 and from 7. 4. 0 before 7. *, with no authentication or user interaction required for exploitation. The vulnerability arises from improper protection of sensitive data in transit, enabling attackers to intercept and access confidential information.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:23:26 UTC

Technical Analysis

CVE-2025-10450 is a vulnerability classified under CWE-359, indicating exposure of private personal information to unauthorized actors due to insufficient protection of sensitive data during network transmission in RTI Connext Professional Core Libraries. The affected versions include 7.2.0 up to but not including 7.3.1, and 7.4.0 up to but not including 7.*. The vulnerability enables attackers to sniff network traffic without requiring authentication or user interaction, exploiting a network attack vector with low attack complexity. The vulnerability impacts confidentiality heavily, with limited impact on integrity and availability. RTI Connext Professional is widely used in real-time distributed systems, including industrial automation, automotive, aerospace, and defense sectors, where secure and reliable data exchange is critical. The flaw likely stems from lack of adequate encryption or improper handling of sensitive data in transit, allowing attackers positioned on the network path to intercept and access private personal information. Although no exploits are known in the wild yet, the vulnerability’s characteristics and CVSS 8.3 score indicate a high risk of exploitation. The absence of patches at the time of disclosure necessitates immediate mitigation through network controls and monitoring. This vulnerability underscores the importance of securing middleware communication layers in critical infrastructure and embedded systems.

Potential Impact

For European organizations, the exposure of private personal information through this vulnerability can lead to significant data breaches, regulatory non-compliance (e.g., GDPR), and loss of trust. Industries relying on RTI Connext Professional for real-time data exchange, such as automotive manufacturing, aerospace, defense, and industrial automation, face risks of intellectual property theft, operational disruption, and espionage. The ability to sniff network traffic without authentication means attackers can operate remotely if they gain network access, increasing the attack surface. Confidentiality breaches can result in fines, legal consequences, and damage to brand reputation. Additionally, compromised data integrity or availability, though limited, could disrupt critical real-time systems, impacting safety and operational continuity. European critical infrastructure operators using RTI products must consider this vulnerability a high priority to avoid cascading effects on national security and economic stability.

Mitigation Recommendations

1. Apply vendor patches immediately once released to address the vulnerability in affected RTI Connext Professional versions. 2. Until patches are available, enforce strong network encryption protocols (e.g., TLS 1.3) on all RTI Connext communication channels to protect data in transit. 3. Implement strict network segmentation and access controls to limit exposure of RTI systems to untrusted networks or actors. 4. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for unusual network traffic patterns indicative of sniffing or interception attempts. 5. Conduct regular security audits and penetration testing focused on middleware communication layers. 6. Educate network and security teams about the vulnerability specifics to enhance incident response readiness. 7. Consider using VPNs or dedicated secure communication tunnels for RTI Connext traffic in sensitive environments. 8. Maintain up-to-date asset inventories to quickly identify and remediate affected systems. These targeted actions go beyond generic advice by focusing on securing the middleware communication and network environment specific to RTI Connext Professional deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
RTI
Date Reserved
2025-09-14T16:19:21.418Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694188253e7fd18214bf80c5

Added to database: 12/16/2025, 4:26:13 PM

Last enriched: 12/23/2025, 5:23:26 PM

Last updated: 2/7/2026, 5:12:54 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats