We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 31 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* |
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon freertos-plus-tcp |
|
| Vendors & Products |
Amazon
Amazon freertos-plus-tcp |
Fri, 10 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 10 Oct 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing code can lead to an invalid pointer dereference when receiving a UDP/IPv6 packet with an incorrect IP version field in the packet header. This issue only affects applications using IPv6. We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes. | |
| Title | Invalid Pointer Dereference when receiving UDP/IPv6 packets in FreeRTOS-Plus-TCP | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-10-10T20:31:12.979Z
Reserved: 2025-10-10T16:49:25.407Z
Link: CVE-2025-11618
Updated: 2025-10-10T20:31:08.355Z
Status : Analyzed
Published: 2025-10-10T18:15:38.460
Modified: 2025-10-31T18:23:01.413
Link: CVE-2025-11618
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:14:00Z