Impact
FreeRTOS-Plus‑TCP omits checksum and minimum‑size checks for packets whose Ethernet source MAC matches a local endpoint. An adjacent actor can spoof such a MAC, causing the loopback detection to skip all validation. This bypass allows the device to process crafted packets that would otherwise be rejected, potentially leading to denial of service or other malicious outcomes.
Affected Systems
AWS FreeRTOS‑Plus‑TCP versions earlier than 4.2.6 for IPv4 and earlier than 4.4.1 for IPv6 are affected. The vulnerability exists in all builds that have the incomplete packet validation logic before these releases.
Risk and Exploitability
The CVSS score of 7.1 categorises the issue as High severity. EPSS data is unavailable, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is network‑based; an unauthenticated actor on the same link can send spoofed frames to trigger the bypass. No special privileges or remote code execution are explicitly required, but the impact could compound with other bugs in the stack.
OpenCVE Enrichment