Loading
In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was a potential out of bound read in _nx_secure_tls_process_clienthello() because of a missing validation of PSK length provided in the user message.
Use CWE-125, Eclipse vendor hub and Threadx Netx Duo product page to widen CVE-2025-55082 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-55085, CVE-2025-55102 and CVE-2025-55094 for nearby disclosures in the same product family.