Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
Mon, 20 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In NetXDuo version before 6.4.4, a networking support module for Eclipse Foundation ThreadX, in the DHCPV6 client there was an unchecked index extracting the server DUID from the server reply. With a crafted packet, an attacker could cause an out of memory read. | |
| Weaknesses | CWE-125 CWE-1285 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-20T20:23:18.104Z
Reserved: 2025-08-06T18:32:14.667Z
Link: CVE-2025-55086
Updated: 2025-10-20T20:23:11.223Z
Status : Analyzed
Published: 2025-10-20T18:15:39.813
Modified: 2025-10-24T15:46:24.557
Link: CVE-2025-55086
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:36Z