Vulnerability Details CVE-2025-55080
In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.5%
CVSS Severity
CVSS v3 Score 7.1
Products affected by CVE-2025-55080
-
cpe:2.3:a:eclipse:threadx:-
-
cpe:2.3:a:eclipse:threadx:6.0
-
cpe:2.3:a:eclipse:threadx:6.0.1
-
cpe:2.3:a:eclipse:threadx:6.0.2
-
cpe:2.3:a:eclipse:threadx:6.1
-
cpe:2.3:a:eclipse:threadx:6.1.1
-
cpe:2.3:a:eclipse:threadx:6.1.10
-
cpe:2.3:a:eclipse:threadx:6.1.11
-
cpe:2.3:a:eclipse:threadx:6.1.12
-
cpe:2.3:a:eclipse:threadx:6.1.2
-
cpe:2.3:a:eclipse:threadx:6.1.3
-
cpe:2.3:a:eclipse:threadx:6.1.5
-
cpe:2.3:a:eclipse:threadx:6.1.6
-
cpe:2.3:a:eclipse:threadx:6.1.7
-
cpe:2.3:a:eclipse:threadx:6.1.8
-
cpe:2.3:a:eclipse:threadx:6.1.9
-
cpe:2.3:a:eclipse:threadx:6.2.0
-
cpe:2.3:a:eclipse:threadx:6.2.1
-
cpe:2.3:a:eclipse:threadx:6.3.0
-
cpe:2.3:a:eclipse:threadx:6.4.0
-
cpe:2.3:a:eclipse:threadx:6.4.1