Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46101 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in RTI Connext Professional (System Designer) allows OS Command Injection.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.19. |
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2024-52058 |
|
Thu, 02 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in RTI Connext Professional (System Designer) allows OS Command Injection.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.19. | |
| Title | Potential arbitrary command execution in System Designer while parsing malicious HTTP/REST requests | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-02-07T21:48:07.958Z
Reserved: 2024-11-05T19:04:16.675Z
Link: CVE-2024-52058
Updated: 2024-12-23T20:06:52.853Z
Status : Analyzed
Published: 2024-12-13T11:15:07.900
Modified: 2025-10-02T13:35:17.877
Link: CVE-2024-52058
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:44:37Z
EUVD