← Retour aux CVEs
CVE-2026-7426
HIGH8.1
Description
Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a prefix length value exceeding the maximum valid length, resulting in a heap buffer overflow. Users processing IPv4 RA only are not impacted. To mitigate this issue, users should upgrade to the fixed version when available.
Details CVE
Score CVSS v3.18.1
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/29/2026
Derniere modification5/4/2026
Sourcenvd
Observations honeypot0
Produits affectes
amazon:freertos-plus-tcp
Faiblesses (CWE)
CWE-787
References
https://aws.amazon.com/security/security-bulletins/2026-023-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.2.6(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.4.1(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-97qg-4359-xm3x(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.