CVE-2025-55093: CWE-126: Buffer Over-read in Eclipse Foundation NetX Duo
In NetX Duo before 6.4.4, the networking support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _nx_ipv4_packet_receive() when handling unicast DHCP messages that could cause corruption of 4 bytes of memory.
AI Analysis
Technical Summary
CVE-2025-55093 is a buffer over-read vulnerability classified under CWE-126, affecting the NetX Duo TCP/IP stack developed by the Eclipse Foundation. Specifically, the vulnerability resides in the _nx_ipv4_packet_receive() function, which handles incoming IPv4 packets, including unicast DHCP messages. In versions prior to 6.4.4, this function improperly processes certain DHCP packets, leading to an out-of-bounds read that corrupts 4 bytes of memory. This flaw arises from insufficient bounds checking when parsing DHCP message data, which can cause the system to read beyond the allocated buffer. The vulnerability can be exploited remotely without authentication or user interaction by sending crafted unicast DHCP packets to a device running the vulnerable NetX Duo version. Although the corruption is limited to 4 bytes, it can result in information disclosure or destabilize the network stack, potentially leading to denial of service or facilitating further attacks. No patches were linked at the time of publication, but upgrading to version 6.4.4 or later is expected to resolve the issue. No known exploits have been reported in the wild, but the network-exposed nature of DHCP services makes this a concern for embedded and IoT devices relying on NetX Duo for networking. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the network attack vector, lack of required privileges, and limited impact on confidentiality and integrity without availability compromise.
Potential Impact
For European organizations, the primary impact of CVE-2025-55093 lies in the potential compromise of embedded and IoT devices that utilize NetX Duo for network connectivity, especially those relying on DHCP for IP configuration. Exploitation could lead to memory corruption, which may cause information leakage or destabilize the device's networking stack, resulting in intermittent connectivity issues or denial of service. This can disrupt critical industrial control systems, smart infrastructure, or other networked embedded applications prevalent in sectors like manufacturing, energy, and transportation. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in environments where devices are exposed to untrusted networks or insufficiently segmented internal networks. Although no active exploits are known, the presence of this flaw could be leveraged by attackers to gain footholds or pivot within networks. The impact on confidentiality and integrity, while limited, is significant enough to warrant attention due to the critical roles these devices often play in operational technology environments.
Mitigation Recommendations
To mitigate CVE-2025-55093, organizations should prioritize updating NetX Duo to version 6.4.4 or later as soon as the patch becomes available from the Eclipse Foundation. In the interim, network administrators should implement strict network segmentation and isolate devices running vulnerable NetX Duo versions from untrusted networks. Deploying DHCP traffic filtering at network boundaries can prevent malicious unicast DHCP packets from reaching vulnerable devices. Monitoring network traffic for anomalous DHCP packets and employing intrusion detection systems tuned for DHCP anomalies can provide early warning of exploitation attempts. Additionally, organizations should conduct an inventory of embedded and IoT devices using NetX Duo to assess exposure and apply compensating controls such as disabling unnecessary DHCP services or restricting device management interfaces. Vendor engagement is recommended to confirm patch availability and coordinate timely updates. Finally, integrating these devices into a broader vulnerability management and incident response program will enhance resilience against exploitation.
Affected Countries
Germany, France, Netherlands, Italy, United Kingdom, Sweden
CVE-2025-55093: CWE-126: Buffer Over-read in Eclipse Foundation NetX Duo
Description
In NetX Duo before 6.4.4, the networking support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _nx_ipv4_packet_receive() when handling unicast DHCP messages that could cause corruption of 4 bytes of memory.
AI-Powered Analysis
Technical Analysis
CVE-2025-55093 is a buffer over-read vulnerability classified under CWE-126, affecting the NetX Duo TCP/IP stack developed by the Eclipse Foundation. Specifically, the vulnerability resides in the _nx_ipv4_packet_receive() function, which handles incoming IPv4 packets, including unicast DHCP messages. In versions prior to 6.4.4, this function improperly processes certain DHCP packets, leading to an out-of-bounds read that corrupts 4 bytes of memory. This flaw arises from insufficient bounds checking when parsing DHCP message data, which can cause the system to read beyond the allocated buffer. The vulnerability can be exploited remotely without authentication or user interaction by sending crafted unicast DHCP packets to a device running the vulnerable NetX Duo version. Although the corruption is limited to 4 bytes, it can result in information disclosure or destabilize the network stack, potentially leading to denial of service or facilitating further attacks. No patches were linked at the time of publication, but upgrading to version 6.4.4 or later is expected to resolve the issue. No known exploits have been reported in the wild, but the network-exposed nature of DHCP services makes this a concern for embedded and IoT devices relying on NetX Duo for networking. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the network attack vector, lack of required privileges, and limited impact on confidentiality and integrity without availability compromise.
Potential Impact
For European organizations, the primary impact of CVE-2025-55093 lies in the potential compromise of embedded and IoT devices that utilize NetX Duo for network connectivity, especially those relying on DHCP for IP configuration. Exploitation could lead to memory corruption, which may cause information leakage or destabilize the device's networking stack, resulting in intermittent connectivity issues or denial of service. This can disrupt critical industrial control systems, smart infrastructure, or other networked embedded applications prevalent in sectors like manufacturing, energy, and transportation. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in environments where devices are exposed to untrusted networks or insufficiently segmented internal networks. Although no active exploits are known, the presence of this flaw could be leveraged by attackers to gain footholds or pivot within networks. The impact on confidentiality and integrity, while limited, is significant enough to warrant attention due to the critical roles these devices often play in operational technology environments.
Mitigation Recommendations
To mitigate CVE-2025-55093, organizations should prioritize updating NetX Duo to version 6.4.4 or later as soon as the patch becomes available from the Eclipse Foundation. In the interim, network administrators should implement strict network segmentation and isolate devices running vulnerable NetX Duo versions from untrusted networks. Deploying DHCP traffic filtering at network boundaries can prevent malicious unicast DHCP packets from reaching vulnerable devices. Monitoring network traffic for anomalous DHCP packets and employing intrusion detection systems tuned for DHCP anomalies can provide early warning of exploitation attempts. Additionally, organizations should conduct an inventory of embedded and IoT devices using NetX Duo to assess exposure and apply compensating controls such as disabling unnecessary DHCP services or restricting device management interfaces. Vendor engagement is recommended to confirm patch availability and coordinate timely updates. Finally, integrating these devices into a broader vulnerability management and incident response program will enhance resilience against exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- eclipse
- Date Reserved
- 2025-08-06T18:32:14.668Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f1d13d9c34d0947ff86bf7
Added to database: 10/17/2025, 5:16:45 AM
Last enriched: 10/17/2025, 5:31:53 AM
Last updated: 10/19/2025, 5:48:41 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumMicrosoft Disrupts Ransomware Campaign Abusing Azure Certificates
MediumMicrosoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
MediumIdentity Security: Your First and Last Line of Defense
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.