Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx |
|
| Vendors & Products |
Eclipse
Eclipse threadx |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write. | |
| Title | Improper Parameter Check in ThreadX Syscall Implementation | |
| Weaknesses | CWE-233 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-15T17:41:32.823Z
Reserved: 2025-08-06T18:32:14.666Z
Link: CVE-2025-55080
Updated: 2025-10-15T17:41:24.372Z
Status : Analyzed
Published: 2025-10-15T06:15:43.897
Modified: 2025-10-22T16:31:40.817
Link: CVE-2025-55080
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:41:09Z