DHCPv6 parser underflow freezes FreeRTOS-Plus-TCP IP task permanently
TL;DR - A crafted DHCPv6 message triggers an integer underflow in FreeRTOS-Plus-TCP's sub-option parser. It corrupts the device's IPv6 address, DNS config, and lease state - then hard-freezes the IP task. Recovery requires a hardware reset. Patch to V4.4.1 or V4.2.6.
What happened
FreeRTOS-Plus-TCP is the TCP/IP stack bundled with FreeRTOS, running on a huge range of constrained embedded devices.
The advisory discloses an integer underflow in the DHCPv6 sub-option parser. An attacker on the same network segment sends a crafted DHCPv6 message. The underflow corrupts parser state, which lets the attacker poison the device's IPv6 address assignment, DNS configuration, and lease timings. The end state is a permanent IP task freeze - the device loses network connectivity and does not recover without a hardware reset.
| Item | Detail |
|---|---|
| Affected versions | >= V4.0.0 and <= V4.2.5; >= V4.3.0 and <= V4.4.0 |
| Patched versions | V4.2.6, V4.4.1 |
| Severity | CVSS v3 base score 8.1 (High) |
| CVSS vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
DHCP parsing bugs are a recurring high-impact class in embedded networking. "Adjacent" in the CVSS vector often means anyone on the same Wi-Fi network or VLAN in practice - not a high bar for an attacker to clear.
Who is impacted
- Devices and products embedding
FreeRTOS-Plus-TCPin the affected version ranges. - Deployments where an attacker can reach DHCPv6 traffic on the same local network segment.
- Fleets where an IP-task freeze means a truck-roll, watchdog reboot, or manual intervention. Availability and operational cost are the real blast radius here.
What to do now
- Upgrade to the patched release for your branch -
V4.4.1if you're on theV4.3.x/V4.4.xline,V4.2.6if you're onV4.2.x."This issue has been addressed in FreeRTOS-Plus-TCP version V4.4.1 and V4.2.6. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes."
- If you cannot upgrade immediately, reduce exposure:
- Disable DHCPv6 and configure IPv6 addressing statically if your environment allows it.
- Restrict DHCPv6 traffic to trusted sources on the local network segment.
- Do the inventory work:
- Identify every firmware image and product that vendors
FreeRTOS-Plus-TCP, including forks and derivative codebases. - Confirm which branch line you are on (
V4.2.xvsV4.4.x) before you pick a target release.
- Identify every firmware image and product that vendors
- After patching, validate IPv6 and DNS configuration state on affected devices - not just "it boots".
Additional information
- GitHub Security Advisory identifier:
GHSA-wrhm-c99p-2p8g. - No CWEs are listed for this issue in the advisory.
Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.
