In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 06:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write. | |
Title | Improper Parameter Check in ThreadX Syscall Implementation | |
Weaknesses | CWE-233 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-10-15T05:41:50.536Z
Reserved: 2025-08-06T18:32:14.666Z
Link: CVE-2025-55080

No data.

Status : Received
Published: 2025-10-15T06:15:43.897
Modified: 2025-10-15T06:15:43.897
Link: CVE-2025-55080

No data.

No data.