First published: Fri Feb 21 2025(Updated: )
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a file in case of an error condition, resulting in the 404 error for each further file request. Users can work-around the issue by disabling the PUT request support.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX NetX Duo | <6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0726 is classified as a denial of service vulnerability.
To fix CVE-2025-0726, update Eclipse ThreadX NetX Duo to version 6.4.2 or later.
CVE-2025-0726 is caused by the failure to close a file in error conditions, allowing an attacker to send specially crafted packets.
CVE-2025-0726 can lead to denial of service, preventing legitimate requests from being processed.
CVE-2025-0726 affects all versions of Eclipse ThreadX NetX Duo before 6.4.2.