Cyber Posture

CVE-2026-7424

High

Published: 29 April 2026

Published
29 April 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0001 3.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7424 is a high-severity Wrap or Wraparound (CWE-191) vulnerability in Amazon Freertos-Plus-Tcp. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the integer underflow vulnerability by requiring timely remediation through patching FreeRTOS-Plus-TCP to fixed versions V4.2.6 or V4.4.1.

prevent

Requires validation of incoming DHCPv6 sub-option data to prevent integer underflow exploitation from crafted packets.

prevent

Enforces least functionality by disabling DHCPv6 when not required, eliminating exposure to the vulnerability present whenever the feature is enabled.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The integer underflow in the DHCPv6 sub-option parser allows an adjacent network attacker to send a single crafted packet that corrupts IPv6/DNS/lease configuration and causes a permanent IP task freeze requiring hardware reset, directly mapping to exploitation of the system/application for denial of service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service (permanent IP task…

more

freeze requiring hardware reset) by sending a single crafted DHCPv6 packet. The issue is present whenever DHCPv6 is enabled. To mitigate this issue, users should upgrade to version V4.2.6 or V4.4.1 or newer.

Deeper analysisAI

CVE-2026-7424 is an integer underflow vulnerability (CWE-191) in the DHCPv6 sub-option parser within FreeRTOS-Plus-TCP versions before V4.4.1 and V4.2.6. It affects embedded devices or systems using this TCP/IP stack when DHCPv6 is enabled, as the flaw exists whenever that feature is active. Published on 2026-04-29, it carries a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), highlighting high impacts on integrity and availability with no confidentiality effects.

An adjacent network actor can exploit this vulnerability by sending a single crafted DHCPv6 packet, requiring low attack complexity and no privileges or user interaction. Successful exploitation allows the attacker to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, while also triggering a denial of service through a permanent IP task freeze that necessitates a hardware reset.

Mitigation requires upgrading to FreeRTOS-Plus-TCP V4.2.6, V4.4.1, or newer versions, as stated in the official advisories. Relevant resources include the AWS security bulletin at https://aws.amazon.com/security/security-bulletins/2026-022-aws/, GitHub release tags for V4.2.6 and V4.4.1, and the security advisory at https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-wrhm-c99p-2p8g.

Details

CWE(s)

Affected Products

amazon
freertos-plus-tcp
4.0.0 — 4.2.6 · 4.3.0 — 4.4.1

CVEs Like This One

CVE-2026-7426Same product: Amazon Freertos-Plus-Tcp
CVE-2026-34064Shared CWE-191
CVE-2026-31662Shared CWE-191
CVE-2026-40386Shared CWE-191
CVE-2026-25532Shared CWE-191
CVE-2025-0727Shared CWE-191
CVE-2025-21276Shared CWE-191
CVE-2025-23206Same vendor: Amazon
CVE-2026-3338Same vendor: Amazon
CVE-2026-3336Same vendor: Amazon

References