Show plain JSON{"containers": {"cna": {"affected": [{"product": "Connext DDS Professional", "vendor": "RTI", "versions": [{"lessThanOrEqual": "6.1.0", "status": "affected", "version": "4.2x", "versionType": "custom"}]}, {"product": "Connext DDS Secure", "vendor": "RTI", "versions": [{"lessThanOrEqual": "6.1.0", "status": "affected", "version": "4.2x", "versionType": "custom"}]}, {"product": "Connext DDS Micro", "vendor": "RTI", "versions": [{"lessThan": "unspecified", "status": "affected", "version": "2.4", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Federico Maggi (Trend Micro Research), Ta-Lun Yen, and Chizuru Toyama (TXOne Networks, Trend Micro) reported these vulnerabilities to CISA. In addition, Patrick Kuo, Mars Cheng (TXOne Networks, Trend Micro), V\u00edctor Mayoral-Vilches (Alias Robotics), and Erik Boasson (ADLINK Technology) also contributed to this research."}], "descriptions": [{"lang": "en", "value": "RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-406", "description": "CWE-406 Insufficient Control of Network Message Volume (Network Amplification)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2025-04-14T18:28:28.777Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02"}, {"url": "https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F"}], "solutions": [{"lang": "en", "value": "RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue."}], "source": {"discovery": "EXTERNAL"}, "title": "RTI Connext DDS Professional and Connext DDS Secure Network Amplification", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-38487", "STATE": "PUBLIC", "TITLE": "RTI Connext DDS Professional and Connext DDS Secure Network Amplification"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Connext DDS Professional", "version": {"version_data": [{"version_affected": "<=", "version_name": "4.2x", "version_value": "6.1.0"}]}}, {"product_name": "Connext DDS Secure", "version": {"version_data": [{"version_affected": "<=", "version_name": "4.2x", "version_value": "6.1.0"}]}}, {"product_name": "Connext DDS Micro", "version": {"version_data": [{"version_affected": ">=", "version_value": "2.4"}]}}]}, "vendor_name": "RTI"}]}}, "credit": [{"lang": "eng", "value": "Federico Maggi (Trend Micro Research), Ta-Lun Yen, and Chizuru Toyama (TXOne Networks, Trend Micro) reported these vulnerabilities to CISA. In addition, Patrick Kuo, Mars Cheng (TXOne Networks, Trend Micro), V\u00edctor Mayoral-Vilches (Alias Robotics), and Erik Boasson (ADLINK Technology) also contributed to this research."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-406 Insufficient Control of Network Message Volume (Network Amplification)"}]}]}, "references": {"reference_data": [{"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02"}, {"name": "https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F", "refsource": "CONFIRM", "url": "https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F"}]}, "solution": [{"lang": "en", "value": "RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue."}], "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T01:44:22.948Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-16T15:56:44.356177Z", "id": "CVE-2021-38487", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-16T16:23:33.579Z"}}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-38487", "datePublished": "2022-05-05T15:18:41.000Z", "dateReserved": "2021-08-10T00:00:00.000Z", "dateUpdated": "2025-04-16T16:23:33.579Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}