In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was a potential out of bound read in _nx_secure_tls_process_clienthello() because of a missing validation of PSK length provided in the user message.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 11:15:00 +0000

Type Values Removed Values Added
Description In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was a potential out of bound read in _nx_secure_tls_process_clienthello() because of a missing validation of PSK length provided in the user message.
Title Potential out of bound read and info leak in_nx_secure_tls_psk_identity_find()
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2025-10-15T13:11:31.010Z

Reserved: 2025-08-06T18:32:14.666Z

Link: CVE-2025-55082

cve-icon Vulnrichment

Updated: 2025-10-15T13:11:06.208Z

cve-icon NVD

Status : Received

Published: 2025-10-15T11:15:39.547

Modified: 2025-10-15T11:15:39.547

Link: CVE-2025-55082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.