Insufficient Packet Validation in FreeRTOS-Plus-TCP from AWS
CVE-2026-7422

7.1HIGH

Key Information:

Vendor

Aws

Vendor
CVE Published:
29 April 2026

What is CVE-2026-7422?

Insufficient packet validation in FreeRTOS-Plus-TCP allows an adjacent network actor to manipulate traffic by spoofing the Ethernet source MAC address. This vulnerability can lead to the bypassing of checksum and minimum-size validation checks, impacting the integrity of network communications. The vulnerability arises because the loopback detection mechanism fails to validate incoming packets from a source MAC that matches a local endpoint, making it critical for users to upgrade to the patched versions to safeguard their systems.

Affected Version(s)

FreeRTOS-Plus-TCP 4.0.0 < 4.2.6

FreeRTOS-Plus-TCP 4.3.0 < 4.4.1

FreeRTOS-Plus-TCP 4.2.6

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.