CVE-2026-7422

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
29/04/2026
Last modified:
04/05/2026

Description

Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device&amp;#39;s own registered endpoints, because the loopback detection mechanism skips all input validation for packets whose source MAC matches a local endpoint.<br /> <br /> <br /> <br /> To mitigate this issue, users should upgrade to the fixed version when available.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* 4.0.0 (including) 4.2.6 (excluding)
cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* 4.3.0 (including) 4.4.1 (excluding)