Vulnerability Details CVE-2025-55081
In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of
certain SSL/TLS client hello message: the ciphersuite length and
compression method length. In case of an attacker-crafted message with
values outside of the expected range, it could cause an out-of-bound
read.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.4%
CVSS Severity
CVSS v3 Score 9.1
Products affected by CVE-2025-55081
-
cpe:2.3:a:eclipse:threadx_netx_duo:-
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0.2
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.10
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.11
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.12
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.2
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.3
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.4
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.5
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.6
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.7
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.8
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.9
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.2.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.2.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.3.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.2
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.3