In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
History

Wed, 15 Oct 2025 06:00:00 +0000

Type Values Removed Values Added
Description In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Title Improper Parameter Check in ThreadX Syscall Implementation
Weaknesses CWE-233
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2025-10-15T05:41:50.536Z

Reserved: 2025-08-06T18:32:14.666Z

Link: CVE-2025-55080

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-15T06:15:43.897

Modified: 2025-10-15T06:15:43.897

Link: CVE-2025-55080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.