CVE-2025-55091

6.5 MEDIUM

📋 TL;DR

This vulnerability in NetX Duo's _nx_ip_packet_receive() function allows an attacker to cause an out-of-bounds read by sending specially crafted Ethernet frames with IP type but no IP data. This could lead to information disclosure, denial of service, or potential remote code execution. Affects all systems using vulnerable versions of NetX Duo networking module in Eclipse ThreadX.

💻 Affected Systems

Products:
  • NetX Duo
  • Eclipse ThreadX with NetX Duo module
Versions: All versions before 6.4.4
Operating Systems: Any OS using NetX Duo networking stack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations using the vulnerable _nx_ip_packet_receive() function. Embedded/IoT devices using ThreadX with NetX Duo are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if the out-of-bounds read can be leveraged for memory corruption attacks.

🟠

Likely Case

Denial of service through system crashes or reboots, potentially with information disclosure of adjacent memory contents.

🟢

If Mitigated

System stability maintained with no data leakage if proper input validation and memory protections are in place.

🌐 Internet-Facing: MEDIUM - Requires sending specially crafted network packets to vulnerable systems, but many IoT/embedded devices using NetX Duo may be internet-accessible.
🏢 Internal Only: LOW - Requires network access to vulnerable systems, but internal network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific malformed Ethernet packets and sending them to vulnerable systems. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NetX Duo 6.4.4 and later

Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-pf5q-r6q5-6j2f

Restart Required: No

Instructions:

1. Update NetX Duo to version 6.4.4 or later. 2. Recompile your ThreadX/NetX Duo application with the updated library. 3. Deploy the updated firmware/software to affected devices.

🔧 Temporary Workarounds

Network filtering

all

Implement network filtering to block malformed Ethernet packets with IP type but no IP data

Input validation enhancement

all

Add additional packet validation before processing in network stack

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Deploy network intrusion prevention systems to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check NetX Duo library version in your application source code or compiled binaries. Vulnerable if version < 6.4.4.

Check Version:

Check NX_VERSION_MAJOR, NX_VERSION_MINOR, NX_VERSION_PATCH in nx_api.h or equivalent version defines

Verify Fix Applied:

Verify NetX Duo version is 6.4.4 or later in your application. Test with malformed Ethernet packets to ensure system stability.

📡 Detection & Monitoring

Log Indicators:

  • System crashes or reboots
  • Memory access violation logs
  • Network stack error messages

Network Indicators:

  • Malformed Ethernet packets with IP type (0x0800) but no IP payload
  • Unusual packet patterns targeting network stack

SIEM Query:

network.protocol:ethernet AND ethernet.type:0x0800 AND (NOT ip.version EXISTS OR packet.size < 60)

🔗 References

📤 Share & Export