Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
|
| Vendors & Products |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
Fri, 30 Jan 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in Zephyr’s network stack allows an IPv4 packet containing ICMP type 128 to be misclassified as an ICMPv6 Echo Request. This results in an out-of-bounds memory read and creates a potential information-leak vulnerability in the networking subsystem. | |
| Title | net: icmp: Out of bound memory read | |
| Weaknesses | CWE-843 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2026-01-30T14:47:21.249Z
Reserved: 2025-11-07T19:33:00.446Z
Link: CVE-2025-12899
Updated: 2026-01-30T14:47:16.831Z
Status : Deferred
Published: 2026-01-30T06:16:01.870
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12899
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:42:17Z