In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx |
|
| Vendors & Products |
Eclipse
Eclipse threadx |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write. | |
| Title | Improper Parameter Check in ThreadX Syscall Implementation | |
| Weaknesses | CWE-233 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published: 2025-10-15T05:41:50.536Z
Updated: 2025-10-15T17:41:32.823Z
Reserved: 2025-08-06T18:32:14.666Z
Link: CVE-2025-55080
Updated: 2025-10-15T17:41:24.372Z
Status : Analyzed
Published: 2025-10-15T06:15:43.897
Modified: 2025-10-22T16:31:40.817
Link: CVE-2025-55080
No data.