CVE-2025-55102

N/A Unknown

📋 TL;DR

This CVE describes a denial-of-service vulnerability in Eclipse ThreadX NetX Duo's IPv6 component where sending a specially crafted 'Packet Too Big' ICMPv6 message with more than 15 different source addresses can crash or hang the system. This affects any device running vulnerable versions of NetX Duo that processes IPv6 network traffic. The vulnerability requires network access to the target system.

💻 Affected Systems

Products:
  • Eclipse ThreadX NetX Duo
Versions: All versions prior to the fix
Operating Systems: Any OS using NetX Duo library
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with IPv6 enabled and processing ICMPv6 packets. Embedded/IoT devices using NetX Duo are primary targets.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or hang requiring manual reboot, disrupting all services on affected devices.

🟠

Likely Case

Temporary service disruption until system automatically recovers or is manually restarted.

🟢

If Mitigated

Minimal impact with proper network filtering and updated software.

🌐 Internet-Facing: MEDIUM - Requires IPv6 connectivity and ability to send crafted ICMPv6 packets, but many networks filter such traffic.
🏢 Internal Only: MEDIUM - Internal attackers with network access could disrupt critical systems using vulnerable components.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted ICMPv6 packets to target IPv6 address, which is straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub advisory for specific fixed version

Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-f3rx-xrwm-q2rf

Restart Required: Yes

Instructions:

1. Update NetX Duo library to patched version. 2. Recompile and redeploy affected applications. 3. Restart systems using the updated library.

🔧 Temporary Workarounds

Filter ICMPv6 Packet Too Big messages

all

Configure network devices to filter or rate-limit ICMPv6 'Packet Too Big' messages to vulnerable systems.

# Example iptables rule for Linux: iptables -A INPUT -p ipv6-icmp --icmpv6-type 2 -j DROP

Disable IPv6 if not required

all

Disable IPv6 functionality on systems where it's not needed for operation.

# Linux: sysctl -w net.ipv6.conf.all.disable_ipv6=1
# Windows: netsh interface ipv6 set state "Ethernet" disabled

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy intrusion prevention systems (IPS) to detect and block malicious ICMPv6 traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check NetX Duo library version against advisory. Systems experiencing unexpected crashes after receiving ICMPv6 traffic may be vulnerable.

Check Version:

# Check NetX Duo version in source code or build configuration

Verify Fix Applied:

Verify NetX Duo library is updated to patched version and test with ICMPv6 traffic simulation.

📡 Detection & Monitoring

Log Indicators:

  • System crashes or hangs after network traffic
  • ICMPv6 packet processing errors in system logs

Network Indicators:

  • Multiple ICMPv6 'Packet Too Big' messages from varied source addresses to single target

SIEM Query:

source:firewall AND icmpv6.type:2 AND count(source_ip) > 15

🔗 References

📤 Share & Export