Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-55081— Potential out of bound read in _nx_secure_tls_process_clienthello()

EPSS 0.06% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-55081

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Potential out of bound read in _nx_secure_tls_process_clienthello()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
缓冲区上溢读取
Source: NVD (National Vulnerability Database)
Vulnerability Title
Eclipse ThreadX NetX Duo 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Eclipse ThreadX NetX Duo是Eclipse ThreadX开源的一个 IPv4 和 IPv6 双重网络堆栈。 Eclipse ThreadX NetX Duo 6.4.4之前版本存在安全漏洞,该漏洞源于_nx_secure_tls_process_clienthello函数缺少对SSL/TLS客户端hello消息中密码套件长度和压缩方法长度的验证,可能导致越界读取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Eclipse FoundationNetX Duo 0 ~ 6.4.4 -

II. Public POCs for CVE-2025-55081

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-55081

登录查看更多情报信息。

Same Patch Batch · Eclipse Foundation · 2025-10-15 · 5 CVEs total

CVE-2025-55080Improper Parameter Check in ThreadX Syscall Implementation
CVE-2025-55079Missing check for thread priority
CVE-2025-55082Potential out of bound read and info leak in_nx_secure_tls_psk_identity_find()
CVE-2025-55083Broken bounds check in Broken bounds check in _nx_secure_tls_process_clienthello_psk_exten

IV. Related Vulnerabilities

V. Comments for CVE-2025-55081

No comments yet


Leave a comment