Description
In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Problem types
Product status
Any version before 6.4.4
Credits
Ilja van Sprundel
Justin-Stauffer
References
github.com/...etxduo/security/advisories/GHSA-5vrv-8j5h-h6h6