Loading
In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
Use CWE-233, Eclipse vendor hub and Threadx product page to widen CVE-2025-55080 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-0648, CVE-2024-2212 and CVE-2024-2214 for nearby disclosures in the same product family.