We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 10 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 10 Oct 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 10 Oct 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing code can lead to an invalid pointer dereference when receiving a UDP/IPv6 packet with an incorrect IP version field in the packet header. This issue only affects applications using IPv6. We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes. | |
Title | Invalid Pointer Dereference when receiving UDP/IPv6 packets in FreeRTOS-Plus-TCP | |
Weaknesses | CWE-476 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-10-10T20:31:12.979Z
Reserved: 2025-10-10T16:49:25.407Z
Link: CVE-2025-11618

Updated: 2025-10-10T20:31:08.355Z

Status : Received
Published: 2025-10-10T18:15:38.460
Modified: 2025-10-10T18:15:38.460
Link: CVE-2025-11618

No data.

No data.