Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55095: CWE-121 Stack-based Buffer Overflow in Eclipse Foundation Eclipse ThreadX - USBX

0
Medium
VulnerabilityCVE-2025-55095cvecve-2025-55095cwe-121cwe-674
Published: Tue Jan 27 2026 (01/27/2026, 15:34:47 UTC)
Source: CVE Database V5
Vendor/Project: Eclipse Foundation
Product: Eclipse ThreadX - USBX

Description

The function _ux_host_class_storage_media_mount() is responsible for mounting partitions on a USB mass storage device. When it encounters an extended partition entry in the partition table, it recursively calls itself to mount the next logical partition. This recursion occurs in _ux_host_class_storage_partition_read(), which parses up to four partition entries. If an extended partition is found (with type UX_HOST_CLASS_STORAGE_PARTITION_EXTENDED or EXTENDED_LBA_MAPPED), the code invokes: _ux_host_class_storage_media_mount(storage, sector + _ux_utility_long_get(...)); There is no limit on the recursion depth or tracking of visited sectors. As a result, a malicious or malformed disk image can include cyclic or excessively deep chains of extended partitions, causing the function to recurse until stack overflow occurs.

AI-Powered Analysis

AILast updated: 01/27/2026, 16:06:10 UTC

Technical Analysis

CVE-2025-55095 is a stack-based buffer overflow vulnerability identified in the Eclipse Foundation's Eclipse ThreadX USBX component, which is a USB host stack used in embedded systems. The vulnerability exists in the function _ux_host_class_storage_media_mount(), which is responsible for mounting partitions on USB mass storage devices. This function recursively processes partition tables by calling itself when it encounters extended partitions (types UX_HOST_CLASS_STORAGE_PARTITION_EXTENDED or EXTENDED_LBA_MAPPED). The recursion occurs within _ux_host_class_storage_partition_read(), which parses up to four partition entries per call. However, there is no mechanism to limit recursion depth or track previously visited sectors. Consequently, a malicious or malformed USB disk image can be crafted with cyclic or excessively deep chains of extended partitions. This causes uncontrolled recursion leading to a stack overflow, which can crash the system or potentially allow execution of arbitrary code depending on the system's memory protections. The vulnerability requires local access to the device and user interaction to mount the malicious USB device. The CVSS 3.1 base score is 4.2 (medium), reflecting the need for local privileges, high attack complexity, and user interaction. The impact affects confidentiality, integrity, and availability to a limited extent. No public exploits or patches are currently available, but the vulnerability is published and should be addressed proactively. This issue is categorized under CWE-121 (stack-based buffer overflow) and CWE-674 (uncontrolled recursion).

Potential Impact

For European organizations, the primary impact of CVE-2025-55095 is the risk of denial of service on embedded or IoT devices that utilize Eclipse ThreadX USBX for USB mass storage handling. Such devices may be found in industrial control systems, medical devices, telecommunications equipment, and consumer electronics. A successful exploit could cause system crashes or reboots, disrupting operations and potentially causing safety or reliability issues. Confidentiality and integrity impacts are limited but possible if an attacker can leverage the overflow to execute arbitrary code, though this is less likely given the complexity and required conditions. Organizations relying on USB mass storage devices in critical infrastructure or manufacturing environments may face operational downtime or degraded service. The vulnerability's requirement for local access and user interaction limits remote exploitation but does not eliminate insider threat or supply chain risks. Overall, the threat is moderate but should be addressed to maintain system stability and security compliance.

Mitigation Recommendations

1. Apply patches or updates from the Eclipse Foundation or device vendors as soon as they become available to fix the recursion and overflow issue. 2. Implement input validation and sanity checks on partition tables before mounting USB mass storage devices, including limiting recursion depth and detecting cyclic partition references. 3. Employ runtime protections such as stack canaries, DEP (Data Execution Prevention), and ASLR (Address Space Layout Randomization) on affected devices to reduce exploitability. 4. Restrict physical access to devices and enforce strict USB device usage policies to prevent unauthorized insertion of malicious USB devices. 5. Monitor device logs and behavior for abnormal USB mount failures or crashes that could indicate exploitation attempts. 6. For critical environments, consider disabling USB mass storage support if not required or using USB device whitelisting solutions. 7. Collaborate with device manufacturers to ensure secure firmware updates and vulnerability management processes are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
eclipse
Date Reserved
2025-08-06T18:56:43.458Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6978dee54623b1157c340bb2

Added to database: 1/27/2026, 3:51:01 PM

Last enriched: 1/27/2026, 4:06:10 PM

Last updated: 2/7/2026, 12:21:06 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats