A missing validation check in FreeRTOS-Plus-TCP's IPv6 packet processing code can lead to an out-of-bounds read when receiving a IPv6 packet with incorrect payload lengths in the packet header. This issue only affects applications using IPv6.
We recommend users upgrade to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes.
References
| Link | Resource |
|---|---|
| https://aws.amazon.com/security/security-bulletins/AWS-2025-023/ | Vendor Advisory |
| https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.3.4 | Release Notes |
| https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-wmjr-wm93-cvv2 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-10-10 18:15
Updated : 2025-10-31 18:22
NVD link : CVE-2025-11617
Mitre link : CVE-2025-11617
CVE.ORG link : CVE-2025-11617
JSON object : View
Products Affected
amazon
- freertos-plus-tcp
CWE
CWE-126
Buffer Over-read
