← Voltar para CVEs
CVE-2026-7422
MEDIUM6.5
Descricao
Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device's own registered endpoints, because the loopback detection mechanism skips all input validation for packets whose source MAC matches a local endpoint. To mitigate this issue, users should upgrade to the fixed version when available.
Detalhes CVE
Pontuacao CVSS v3.16.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Vetor de ataqueADJACENT_NETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/29/2026
Ultima modificacao5/4/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
amazon:freertos-plus-tcp
Fraquezas (CWE)
CWE-290
Referencias
https://aws.amazon.com/security/security-bulletins/2026-021-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.2.6(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.4.1(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-jpw4-6h59-62w9(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.