Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 20 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
Fri, 17 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior. | |
| Title | Web http client: Unchecked Server-Side Malicious Packet Issue | |
| Weaknesses | CWE-125 CWE-1286 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-20T18:42:08.621Z
Reserved: 2025-08-06T18:32:14.666Z
Link: CVE-2025-55085
Updated: 2025-10-20T18:42:04.595Z
Status : Analyzed
Published: 2025-10-17T15:15:38.907
Modified: 2025-10-27T14:33:47.567
Link: CVE-2025-55085
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:21:57Z