certain SSL/TLS client hello message: the ciphersuite length and
compression method length. In case of an attacker-crafted message with
values outside of the expected range, it could cause an out-of-bound
read.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
Wed, 15 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read. | |
| Title | Potential out of bound read in _nx_secure_tls_process_clienthello() | |
| Weaknesses | CWE-126 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-15T13:14:49.223Z
Reserved: 2025-08-06T18:32:14.666Z
Link: CVE-2025-55081
Updated: 2025-10-15T13:14:45.927Z
Status : Analyzed
Published: 2025-10-15T11:15:39.063
Modified: 2025-10-27T19:03:20.530
Link: CVE-2025-55081
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:40:58Z