CVE-2025-55081
CRITICALEclipse Foundation NextX Duo <6.4.4 - Buffer Overflow
Title source: llmDescription
In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Scores
CVSS v3
9.1
EPSS
0.0006
EPSS Percentile
19.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
CWE-126
Status
published
Products (1)
eclipse/threadx_netx_duo
< 6.4.4.202503
Published
Oct 15, 2025
Tracked Since
Feb 18, 2026