In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
History

Wed, 15 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
Description In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Title Potential out of bound read in _nx_secure_tls_process_clienthello()
Weaknesses CWE-126
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2025-10-15T13:14:49.223Z

Reserved: 2025-08-06T18:32:14.666Z

Link: CVE-2025-55081

cve-icon Vulnrichment

Updated: 2025-10-15T13:14:45.927Z

cve-icon NVD

Status : Received

Published: 2025-10-15T11:15:39.063

Modified: 2025-10-15T11:15:39.063

Link: CVE-2025-55081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.