Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
Tue, 27 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial-of-service vulnerability exists in the NetX IPv6 component functionality of Eclipse ThreadX NetX Duo. A specially crafted network packet of "Packet Too Big" with more than 15 different source address can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability. | |
| Weaknesses | CWE-400 CWE-404 CWE-770 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-01-27T15:58:21.021Z
Reserved: 2025-08-06T18:56:43.458Z
Link: CVE-2025-55102
Updated: 2026-01-27T15:58:16.263Z
Status : Analyzed
Published: 2026-01-27T16:16:15.113
Modified: 2026-04-02T20:30:19.657
Link: CVE-2025-55102
No data.
OpenCVE Enrichment
Updated: 2026-01-27T20:16:22Z