CVE-2025-55086

9.8 CRITICAL

📋 TL;DR

This vulnerability in NetXDuo's DHCPv6 client allows attackers to cause out-of-bounds memory reads by sending specially crafted DHCPv6 packets. It affects all systems using vulnerable versions of NetXDuo, which is a networking module for embedded systems running Eclipse ThreadX. The high CVSS score indicates critical remote code execution potential.

💻 Affected Systems

Products:
  • NetXDuo
  • Eclipse ThreadX with NetXDuo integration
Versions: All versions before 6.4.4
Operating Systems: Any OS using NetXDuo (typically embedded/RTOS systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with DHCPv6 client functionality enabled. Common in IoT devices, embedded systems, and network equipment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, denial of service, or information disclosure from memory.

🟠

Likely Case

System crashes, denial of service, or information leakage from memory reads.

🟢

If Mitigated

Limited impact if network segmentation prevents DHCPv6 traffic from untrusted sources.

🌐 Internet-Facing: HIGH - DHCPv6 clients typically listen on local networks and could be exploited by any device on the same network segment.
🏢 Internal Only: HIGH - Internal attackers or compromised devices on the same network could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted DHCPv6 packets to the target. No authentication needed as DHCPv6 is a network protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.4

Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-99pw-cp79-2j5j

Restart Required: Yes

Instructions:

1. Update NetXDuo to version 6.4.4 or later. 2. Recompile your application with the updated library. 3. Deploy the updated firmware/software to affected devices. 4. Restart devices to load the patched version.

🔧 Temporary Workarounds

Disable DHCPv6 Client

all

Disable DHCPv6 functionality if static IPv6 addressing is feasible.

Configure static IPv6 addresses instead of using DHCPv6

Network Segmentation

all

Isolate affected devices on separate VLANs with strict firewall rules.

Implement VLAN segmentation
Configure firewall to block DHCPv6 traffic from untrusted sources

🧯 If You Can't Patch

  • Implement strict network access controls to limit DHCPv6 traffic to trusted sources only.
  • Monitor network traffic for anomalous DHCPv6 packets and implement intrusion detection.

🔍 How to Verify

Check if Vulnerable:

Check NetXDuo version in your firmware/software. If version is <6.4.4 and DHCPv6 client is enabled, you are vulnerable.

Check Version:

Check your build configuration or firmware version information for NetXDuo version.

Verify Fix Applied:

Verify NetXDuo version is 6.4.4 or later in your compiled application.

📡 Detection & Monitoring

Log Indicators:

  • System crashes
  • Memory access violation logs
  • DHCPv6 protocol errors

Network Indicators:

  • Unusual DHCPv6 traffic patterns
  • Malformed DHCPv6 packets

SIEM Query:

search for DHCPv6 protocol anomalies or system crash events related to network services

🔗 References

📤 Share & Export