Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
|
| Vendors & Products |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
Fri, 30 Jan 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in Zephyr’s network stack allows an IPv4 packet containing ICMP type 128 to be misclassified as an ICMPv6 Echo Request. This results in an out-of-bounds memory read and creates a potential information-leak vulnerability in the networking subsystem. | |
| Title | net: icmp: Out of bound memory read | |
| Weaknesses | CWE-843 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2026-01-30T14:47:21.249Z
Reserved: 2025-11-07T19:33:00.446Z
Link: CVE-2025-12899
Updated: 2026-01-30T14:47:16.831Z
Status : Received
Published: 2026-01-30T06:16:01.870
Modified: 2026-01-30T06:16:01.870
Link: CVE-2025-12899
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:42:17Z