In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
History

Wed, 22 Oct 2025 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Eclipse
Eclipse threadx
Vendors & Products Eclipse
Eclipse threadx

Wed, 15 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 06:00:00 +0000

Type Values Removed Values Added
Description In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Title Improper Parameter Check in ThreadX Syscall Implementation
Weaknesses CWE-233
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published: 2025-10-15T05:41:50.536Z

Updated: 2025-10-15T17:41:32.823Z

Reserved: 2025-08-06T18:32:14.666Z

Link: CVE-2025-55080

cve-icon Vulnrichment

Updated: 2025-10-15T17:41:24.372Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-15T06:15:43.897

Modified: 2025-10-22T16:31:40.817

Link: CVE-2025-55080

cve-icon Redhat

No data.