CVE-2025-55081

In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

27 Oct 2025, 19:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-5vrv-8j5h-h6h6 - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-5vrv-8j5h-h6h6 - Vendor Advisory
First Time Eclipse threadx Netx Duo
Eclipse
CWE CWE-125
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

15 Oct 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-15 11:15

Updated : 2025-10-27 19:03


NVD link : CVE-2025-55081

Mitre link : CVE-2025-55081

CVE.ORG link : CVE-2025-55081


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE
CWE-126

Buffer Over-read

CWE-125

Out-of-bounds Read