The issue is present whenever DHCPv6 is enabled.
To mitigate this issue, users should upgrade to version V4.2.6 or V4.4.1 or newer.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* |
Thu, 30 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon freertos-plus-tcp |
|
| Vendors & Products |
Amazon
Amazon freertos-plus-tcp |
Wed, 29 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 29 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service (permanent IP task freeze requiring hardware reset) by sending a single crafted DHCPv6 packet. The issue is present whenever DHCPv6 is enabled. To mitigate this issue, users should upgrade to version V4.2.6 or V4.4.1 or newer. | |
| Title | Integer Underflow in DHCPv6 Sub-Option Parser in FreeRTOS-Plus-TCP | |
| Weaknesses | CWE-191 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-29T22:13:39.794Z
Reserved: 2026-04-29T14:27:50.756Z
Link: CVE-2026-7424
Updated: 2026-04-29T19:08:57.950Z
Status : Analyzed
Published: 2026-04-29T19:16:26.743
Modified: 2026-05-04T13:22:20.383
Link: CVE-2026-7424
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:15:31Z