VYPR

NextX Duo

by Eclipse Foundation

CVEs (2)

  • CVE-2025-55082Oct 15, 2025
    risk 0.00cvss epss 0.00

    In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was a potential out of bound read in _nx_secure_tls_process_clienthello() because of a missing validation of PSK length provided in the user message.

  • CVE-2025-55081Oct 15, 2025
    risk 0.00cvss epss 0.00

    In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.