Vulnerability Description
A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing code can lead to an invalid pointer dereference when receiving a UDP/IPv6 packet with an incorrect IP version field in the packet header. This issue only affects applications using IPv6. We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Freertos-Plus-Tcp | >= 4.0.0, < 4.3.4 |
Related Weaknesses (CWE)
References
- https://aws.amazon.com/security/security-bulletins/AWS-2025-023/Vendor Advisory
- https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.3.4Release Notes
- https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-6fh9-mqxjVendor Advisory
FAQ
What is CVE-2025-11618?
CVE-2025-11618 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing code can lead to an invalid pointer dereference when receiving a UDP/IPv6 packet with an incorrect IP version field in the ...
How severe is CVE-2025-11618?
CVE-2025-11618 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11618?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Freertos-Plus-Tcp.