version 6.4.2, an attacker can cause a denial of service by specially
crafted packets. The core issue is missing closing of a file in case of
an error condition, resulting in the 404 error for each further file
request. Users can work-around the issue by disabling the PUT request
support.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5084 | In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a file in case of an error condition, resulting in the 404 error for each further file request. Users can work-around the issue by disabling the PUT request support. |
Thu, 31 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
|
| Metrics |
cvssV3_1
|
Fri, 21 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a file in case of an error condition, resulting in the 404 error for each further file request. Users can work-around the issue by disabling the PUT request support. | |
| Title | Eclipse ThreadX NetX Duo HTTP server denial of service | |
| Weaknesses | CWE-459 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-02-21T14:17:39.802Z
Reserved: 2025-01-27T08:40:44.279Z
Link: CVE-2025-0726
Updated: 2025-02-21T14:17:34.378Z
Status : Analyzed
Published: 2025-02-21T08:15:28.417
Modified: 2025-07-31T16:32:38.330
Link: CVE-2025-0726
No data.
OpenCVE Enrichment
No data.
EUVD