CVE-2025-55085

📊 8.8 HIGH0.2%🎯 0 exploits
📅 Published Oct 17, 2025
📋 Status: Analyzed

In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Vulnerable
Version: < 6.4.4.202503
CPE:
cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
Metrics
8.8 HIGHCVSS v4.0[email protected]
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
8.8 (HIGH)v4.0
EPSS Details
0.2% (Minimal)38.4th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Oct 17, 2025 (16 days ago)
Last Modified
Oct 27, 2025 (6 days ago)
Security Weaknesses2
References1