Integer Underflow Vulnerability in Eclipse ThreadX NetX Duo HTTP Server
CVE-2025-2259
5.3MEDIUM
Summary
In the NetX HTTP server functionality of Eclipse ThreadX NetX Duo, versions prior to 6.4.3, an attacker can exploit an integer underflow vulnerability. This occurs when the attacker sends specially crafted packets that manipulate the Content-Length header, leading to a denial of service. A potential workaround to mitigate this issue is to disable HTTP PUT support. This vulnerability is an extension of an incomplete fix related to a previous security issue.
Affected Version(s)
ThreadX 0 < 6.4.2
References
CVSS V4
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Kelly Patterson of Cisco Talos