Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx |
|
| Vendors & Products |
Eclipse
Eclipse threadx |
Tue, 14 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Oct 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse ThreadX before version 6.4.3, an attacker can cause a denial of service (crash) by providing a pointer to a reserved or unmapped memory region. Vulnerable system calls had a check of pointers, but that check wasn't verifying whether the pointer is outside the module memory region. | |
| Title | Incomplete validation of kernel object pointers in system calls | |
| Weaknesses | CWE-233 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-14T15:29:21.710Z
Reserved: 2025-08-06T18:32:14.665Z
Link: CVE-2025-55078
Updated: 2025-10-14T15:29:17.344Z
Status : Analyzed
Published: 2025-10-14T08:15:36.173
Modified: 2025-10-21T19:45:33.453
Link: CVE-2025-55078
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:10:36Z