Buffer Over-read Affecting eclipse-threadx/netxduo package, versions [,6.4.4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ECLIPSETHREADXNETXDUO-13611111
  • published17 Oct 2025
  • disclosed17 Oct 2025
  • creditJustin-Stauffer

Introduced: 17 Oct 2025

NewCVE-2025-55093  (opens in a new tab)
CWE-126  (opens in a new tab)

How to fix?

Upgrade eclipse-threadx/netxduo to version 6.4.4 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Over-read via the _nx_ipv4_packet_receive() function when processing unicast DHCP messages. An attacker can cause memory corruption or potentially read sensitive memory contents by sending specially crafted network packets.

CVSS Base Scores

version 4.0
version 3.1