Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55096: CWE-191 Integer Underflow (Wrap or Wraparound) in Eclipse Foundation NetX Duo

0
Low
VulnerabilityCVE-2025-55096cvecve-2025-55096cwe-191
Published: Fri Oct 17 2025 (10/17/2025, 05:32:45 UTC)
Source: CVE Database V5
Vendor/Project: Eclipse Foundation
Product: NetX Duo

Description

In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_hid_report_descriptor_get()  when parsing a descriptor of an USB HID device.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:46:45 UTC

Technical Analysis

CVE-2025-55096 identifies an integer underflow vulnerability (CWE-191) in the USBX component of Eclipse Foundation's NetX Duo, specifically in versions prior to 6.4.3. The flaw exists in the function _ux_host_class_hid_report_descriptor_get(), which parses USB Human Interface Device (HID) report descriptors. An integer underflow during parsing can lead to an out-of-bounds read, potentially exposing sensitive memory contents or causing system instability. The vulnerability is local (attack vector: local), requires high attack complexity, and does not require privileges, authentication, or user interaction. The CVSS 4.0 base score is 2.1, reflecting a low severity due to limited impact and exploitation difficulty. No public exploits or widespread attacks have been reported. USBX is a USB host/device stack used primarily in embedded systems and IoT devices, often integrated with ThreadX RTOS. The vulnerability could affect embedded devices that rely on USB HID device communication, including industrial controllers, medical devices, or consumer electronics. The absence of a patch link suggests that remediation may require upgrading to USBX 6.4.3 or later once available. The flaw's exploitation could lead to information disclosure or denial of service due to memory corruption, but no code execution or privilege escalation is indicated. The vulnerability highlights the importance of robust input validation in USB descriptor parsing within embedded software stacks.

Potential Impact

For European organizations, the impact is primarily on embedded systems and IoT devices that incorporate the vulnerable USBX versions. Potential consequences include information leakage from out-of-bounds reads and possible device instability or crashes, which could disrupt operations in critical infrastructure, manufacturing, or healthcare sectors. Although the vulnerability requires local access and has high attack complexity, insider threats or compromised devices could exploit it. The limited severity and lack of known exploits reduce immediate risk, but unpatched devices in industrial control systems or medical equipment could face reliability issues or data exposure. European companies relying on embedded USB HID devices in their supply chains or products should assess exposure. The impact on confidentiality and availability is low to moderate, with integrity impact minimal. Operational disruptions in critical sectors could have cascading effects, emphasizing the need for timely mitigation.

Mitigation Recommendations

1. Upgrade USBX to version 6.4.3 or later as soon as it becomes available to ensure the vulnerability is patched. 2. Conduct an inventory of embedded devices and IoT systems using NetX Duo USBX to identify potentially affected assets. 3. Implement strict access controls to limit local access to embedded devices, reducing the attack surface. 4. Monitor USB HID device interactions and logs for anomalous behavior that could indicate exploitation attempts. 5. Where possible, apply input validation and boundary checks in custom USB HID parsing code to mitigate risks. 6. Collaborate with device manufacturers and suppliers to confirm firmware updates addressing this vulnerability. 7. For critical infrastructure, consider network segmentation and device isolation to contain potential exploitation. 8. Maintain up-to-date asset management and vulnerability scanning focused on embedded systems. 9. Educate operational technology (OT) personnel about this vulnerability and the importance of patching embedded USB stacks. 10. Prepare incident response plans specific to embedded device compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
eclipse
Date Reserved
2025-08-06T18:56:43.458Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f1d5f59c34d0947ffa1173

Added to database: 10/17/2025, 5:36:53 AM

Last enriched: 10/17/2025, 5:46:45 AM

Last updated: 10/19/2025, 11:16:52 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats