Insufficient Packet Validation in FreeRTOS-Plus-TCP from AWS
CVE-2026-7422
7.1HIGH
What is CVE-2026-7422?
Insufficient packet validation in FreeRTOS-Plus-TCP allows an adjacent network actor to manipulate traffic by spoofing the Ethernet source MAC address. This vulnerability can lead to the bypassing of checksum and minimum-size validation checks, impacting the integrity of network communications. The vulnerability arises because the loopback detection mechanism fails to validate incoming packets from a source MAC that matches a local endpoint, making it critical for users to upgrade to the patched versions to safeguard their systems.
Affected Version(s)
FreeRTOS-Plus-TCP 4.0.0 < 4.2.6
FreeRTOS-Plus-TCP 4.3.0 < 4.4.1
FreeRTOS-Plus-TCP 4.2.6
