To mitigate this issue, users should upgrade to the fixed version when available.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon freertos-plus-tcp |
|
| Vendors & Products |
Amazon
Amazon freertos-plus-tcp |
Wed, 29 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device's own registered endpoints, because the loopback detection mechanism skips all input validation for packets whose source MAC matches a local endpoint. To mitigate this issue, users should upgrade to the fixed version when available. | |
| Title | MAC Address Validation Bypass in FreeRTOS-Plus-TCP IPv4 and IPv6 Packet Processing | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-29T19:07:31.899Z
Reserved: 2026-04-29T14:27:48.592Z
Link: CVE-2026-7422
Updated: 2026-04-29T19:07:28.207Z
Status : Received
Published: 2026-04-29T19:16:26.487
Modified: 2026-04-29T19:16:26.487
Link: CVE-2026-7422
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:15:31Z