CVE-2025-0727

7.5 HIGH

📋 TL;DR

An integer underflow vulnerability in NetX HTTP server functionality of Eclipse ThreadX NetX Duo allows attackers to cause denial of service by sending specially crafted HTTP packets with mismatched Content-Length and data request sizes. This affects all systems using NetX Duo HTTP server functionality before version 6.4.2.

💻 Affected Systems

Products:
  • Eclipse ThreadX NetX Duo
Versions: All versions before 6.4.2
Operating Systems: Any OS using NetX Duo library
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with HTTP server functionality enabled. HTTP PUT support must be enabled for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete HTTP service disruption leading to unavailability of web services and potential cascading failures in dependent systems.

🟠

Likely Case

HTTP service crashes or becomes unresponsive, requiring manual restart of affected services.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH - HTTP servers exposed to internet are directly vulnerable to unauthenticated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific HTTP packets but no authentication is needed. The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.2

Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w

Restart Required: Yes

Instructions:

1. Update NetX Duo library to version 6.4.2 or later. 2. Recompile and redeploy applications using the updated library. 3. Restart affected services.

🔧 Temporary Workarounds

Disable HTTP PUT Support

all

Disable HTTP PUT method in NetX Duo HTTP server configuration to prevent exploitation.

Modify HTTP server configuration to disable PUT method support

🧯 If You Can't Patch

  • Implement network filtering to block HTTP PUT requests to vulnerable systems.
  • Deploy web application firewall (WAF) rules to detect and block malicious Content-Length manipulation attempts.

🔍 How to Verify

Check if Vulnerable:

Check NetX Duo library version in your application. If version is below 6.4.2 and HTTP server with PUT support is enabled, the system is vulnerable.

Check Version:

Check application build configuration or library headers for NX_DUO_VERSION define

Verify Fix Applied:

Verify NetX Duo library version is 6.4.2 or later and test HTTP PUT functionality with various Content-Length values.

📡 Detection & Monitoring

Log Indicators:

  • HTTP server crash logs
  • Unexpected service restarts
  • Error messages related to integer underflow or buffer handling

Network Indicators:

  • HTTP PUT requests with mismatched Content-Length and actual data size
  • Multiple failed HTTP requests followed by service unavailability

SIEM Query:

source="http_server" AND (event="crash" OR event="restart") AND method="PUT"

🔗 References

📤 Share & Export