First published: Sun Apr 06 2025(Updated: )
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a file in case of an error condition, resulting in the 404 error for each further file request. Users can work-around the issue by disabling the PUT request support. This issue follows an incomplete fix of CVE-2025-0726.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX | <6.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2260 has been classified as a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2025-2260, upgrade Eclipse ThreadX NetX Duo to version 6.4.3 or later.
CVE-2025-2260 is caused by a failure to close a file during error conditions, leading to denial of service when processing crafted packets.
Eclipse ThreadX NetX Duo versions prior to 6.4.3 are affected by CVE-2025-2260.
The impact of CVE-2025-2260 is that an attacker can cause a denial of service, disrupting the functionality of the HTTP server.