Loading
In Eclipse Foundation NextX Duo before 6.4.4, a module of ThreadX, the _nx_secure_tls_process_clienthello() function was missing length verification of certain SSL/TLS client hello message: the ciphersuite length and compression method length. In case of an attacker-crafted message with values outside of the expected range, it could cause an out-of-bound read.
Use CWE-126, Eclipse vendor hub and Threadx Netx Duo product page to widen CVE-2025-55081 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-55085, CVE-2025-55102 and CVE-2025-55094 for nearby disclosures in the same product family.