CVE-2025-55086

📊 6.3 MEDIUM0.1%🎯 0 exploits
📅 Published Oct 20, 2025
📋 Status: Analyzed

In NetXDuo version before 6.4.4, a networking support module for Eclipse Foundation ThreadX, in the DHCPV6 client there was an unchecked index extracting the server DUID from the server reply. With a crafted packet, an attacker could cause an out of memory read.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Vulnerable
Version: < 6.4.4.202503
CPE:
cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
Metrics
6.3 MEDIUMCVSS v4.0[email protected]
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
6.3 (MEDIUM)v4.0
EPSS Details
0.1% (Minimal)19.8th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Oct 20, 2025 (13 days ago)
Last Modified
Oct 24, 2025 (9 days ago)
Security Weaknesses3
References2