Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1254: CWE-125 Out-of-bounds Read in RTI Connext Professional

0
High
VulnerabilityCVE-2025-1254cvecve-2025-1254cwe-125cwe-787
Published: Thu May 08 2025 (05/08/2025, 08:32:43 UTC)
Source: CVE
Vendor/Project: RTI
Product: Connext Professional

Description

Out-of-bounds Read, Out-of-bounds Write vulnerability in RTI Connext Professional (Recording Service) allows Overflow Buffers, Overread Buffers.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42.

AI-Powered Analysis

AILast updated: 12/16/2025, 17:12:35 UTC

Technical Analysis

CVE-2025-1254 is a vulnerability classified under CWE-125 (Out-of-bounds Read) and CWE-787 (Out-of-bounds Write) affecting RTI Connext Professional, specifically its Recording Service component. The flaw allows attackers to perform out-of-bounds memory operations, which can lead to buffer overflows and overreads. This can cause memory corruption, potentially enabling arbitrary code execution, data leakage, or denial of service. The affected versions include 6.0.0 before 6.0.1.42, 6.1.0 before 6.1.2.23, 7.0.0 before 7.3.0.7, and 7.4.0 before 7.5.0. The vulnerability is remotely exploitable over the network with low attack complexity and requires only low privileges, but no user interaction is necessary. The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability, with no scope change or user interaction required. Although no public exploits are currently known, the vulnerability poses a significant risk due to the critical nature of RTI Connext Professional in real-time data distribution and industrial IoT environments. The absence of patch links suggests that fixes may be forthcoming or need to be obtained directly from the vendor. The Recording Service's role in handling real-time data streams makes this vulnerability particularly dangerous, as exploitation could disrupt critical communications or leak sensitive operational data.

Potential Impact

For European organizations, especially those in industrial automation, defense, transportation, and critical infrastructure sectors, this vulnerability could lead to severe operational disruptions. RTI Connext Professional is widely used in real-time data distribution systems, including industrial IoT and control systems, which are integral to manufacturing plants, energy grids, and defense applications. Exploitation could result in unauthorized data access, manipulation of real-time data streams, or denial of service, potentially causing safety hazards or operational downtime. The high impact on confidentiality, integrity, and availability means sensitive operational data could be exposed or corrupted, undermining trust and compliance with regulations such as GDPR. Given the increasing reliance on interconnected industrial systems in Europe, this vulnerability could have cascading effects on supply chains and critical services.

Mitigation Recommendations

Organizations should immediately inventory their deployments of RTI Connext Professional to identify affected versions. While official patches are not linked, contacting RTI for the latest security updates or hotfixes is critical. Until patches are applied, network segmentation should be enforced to isolate the Recording Service from untrusted networks. Implement strict access controls limiting low-privilege accounts that can interact with the Recording Service. Deploy intrusion detection and anomaly monitoring focused on unusual memory or network activity related to RTI services. Employ application-layer firewalls or protocol-aware filtering to restrict malformed or unexpected traffic. Conduct thorough security testing and code audits if custom integrations with RTI Connext exist. Finally, maintain robust incident response plans tailored to industrial control system environments to quickly address potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
RTI
Date Reserved
2025-02-12T15:31:57.062Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd85f4

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 12/16/2025, 5:12:35 PM

Last updated: 1/7/2026, 6:11:27 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats