CVE-2025-55086
📋 TL;DR
This vulnerability in NetXDuo's DHCPv6 client allows attackers to cause out-of-bounds memory reads by sending specially crafted DHCPv6 packets. It affects all systems using vulnerable versions of NetXDuo, which is a networking module for embedded systems running Eclipse ThreadX. The high CVSS score indicates critical remote code execution potential.
💻 Affected Systems
- NetXDuo
- Eclipse ThreadX with NetXDuo integration
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, denial of service, or information disclosure from memory.
Likely Case
System crashes, denial of service, or information leakage from memory reads.
If Mitigated
Limited impact if network segmentation prevents DHCPv6 traffic from untrusted sources.
🎯 Exploit Status
Exploitation requires sending crafted DHCPv6 packets to the target. No authentication needed as DHCPv6 is a network protocol.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.4
Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-99pw-cp79-2j5j
Restart Required: Yes
Instructions:
1. Update NetXDuo to version 6.4.4 or later. 2. Recompile your application with the updated library. 3. Deploy the updated firmware/software to affected devices. 4. Restart devices to load the patched version.
🔧 Temporary Workarounds
Disable DHCPv6 Client
allDisable DHCPv6 functionality if static IPv6 addressing is feasible.
Configure static IPv6 addresses instead of using DHCPv6
Network Segmentation
allIsolate affected devices on separate VLANs with strict firewall rules.
Implement VLAN segmentation
Configure firewall to block DHCPv6 traffic from untrusted sources
🧯 If You Can't Patch
- Implement strict network access controls to limit DHCPv6 traffic to trusted sources only.
- Monitor network traffic for anomalous DHCPv6 packets and implement intrusion detection.
🔍 How to Verify
Check if Vulnerable:
Check NetXDuo version in your firmware/software. If version is <6.4.4 and DHCPv6 client is enabled, you are vulnerable.
Check Version:
Check your build configuration or firmware version information for NetXDuo version.
Verify Fix Applied:
Verify NetXDuo version is 6.4.4 or later in your compiled application.
📡 Detection & Monitoring
Log Indicators:
- System crashes
- Memory access violation logs
- DHCPv6 protocol errors
Network Indicators:
- Unusual DHCPv6 traffic patterns
- Malformed DHCPv6 packets
SIEM Query:
search for DHCPv6 protocol anomalies or system crash events related to network services