CVE-2025-55082

In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was a potential out of bound read in _nx_secure_tls_process_clienthello() because of a missing validation of PSK length provided in the user message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

21 Oct 2025, 16:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-8h38-qjhh-mf2h - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-8h38-qjhh-mf2h - Vendor Advisory
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
First Time Eclipse
Eclipse threadx Netx Duo

15 Oct 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-15 11:15

Updated : 2025-10-21 16:59


NVD link : CVE-2025-55082

Mitre link : CVE-2025-55082

CVE.ORG link : CVE-2025-55082


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE
CWE-125

Out-of-bounds Read