Home

Description

In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.

PUBLISHED Reserved 2025-08-06 | Published 2025-10-15 | Updated 2025-10-15 | Assigner eclipse




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-126: Buffer Over-read

Product status

Default status
unaffected

Any version before 6.4.4
affected

Credits

Ilja van Sprundel finder

Justin-Stauffer finder

References

github.com/...etxduo/security/advisories/GHSA-5vrv-8j5h-h6h6

cve.org (CVE-2025-55081)

nvd.nist.gov (CVE-2025-55081)

Download JSON