CVE-2025-55094
BaseFortify
Publication date: 2025-10-17
Last updated on: 2025-10-24
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | threadx_netx_duo | to 6.4.4.202503 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out of bound read issue in the NetX Duo networking support module for Eclipse Foundation ThreadX, specifically in the function _nx_icmpv6_validate_options() when processing a packet containing ICMPv6 options. This means the software may read memory outside the intended buffer boundaries, potentially leading to unexpected behavior or crashes.
How can this vulnerability impact me? :
The out of bound read vulnerability could lead to application instability, crashes, or potentially expose sensitive information from memory. Since it involves network packet processing, it could be exploited remotely without authentication, impacting the availability or confidentiality of the affected system.