CVE-2025-55096: CWE-191 Integer Underflow (Wrap or Wraparound) in Eclipse Foundation NetX Duo
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_hid_report_descriptor_get() when parsing a descriptor of an USB HID device.
AI Analysis
Technical Summary
CVE-2025-55096 identifies an integer underflow vulnerability (CWE-191) in the USBX component of Eclipse Foundation's NetX Duo, specifically in versions prior to 6.4.3. The flaw exists in the function _ux_host_class_hid_report_descriptor_get(), which parses USB Human Interface Device (HID) report descriptors. An integer underflow during parsing can lead to an out-of-bounds read, potentially exposing sensitive memory contents or causing system instability. The vulnerability is local (attack vector: local), requires high attack complexity, and does not require privileges, authentication, or user interaction. The CVSS 4.0 base score is 2.1, reflecting a low severity due to limited impact and exploitation difficulty. No public exploits or widespread attacks have been reported. USBX is a USB host/device stack used primarily in embedded systems and IoT devices, often integrated with ThreadX RTOS. The vulnerability could affect embedded devices that rely on USB HID device communication, including industrial controllers, medical devices, or consumer electronics. The absence of a patch link suggests that remediation may require upgrading to USBX 6.4.3 or later once available. The flaw's exploitation could lead to information disclosure or denial of service due to memory corruption, but no code execution or privilege escalation is indicated. The vulnerability highlights the importance of robust input validation in USB descriptor parsing within embedded software stacks.
Potential Impact
For European organizations, the impact is primarily on embedded systems and IoT devices that incorporate the vulnerable USBX versions. Potential consequences include information leakage from out-of-bounds reads and possible device instability or crashes, which could disrupt operations in critical infrastructure, manufacturing, or healthcare sectors. Although the vulnerability requires local access and has high attack complexity, insider threats or compromised devices could exploit it. The limited severity and lack of known exploits reduce immediate risk, but unpatched devices in industrial control systems or medical equipment could face reliability issues or data exposure. European companies relying on embedded USB HID devices in their supply chains or products should assess exposure. The impact on confidentiality and availability is low to moderate, with integrity impact minimal. Operational disruptions in critical sectors could have cascading effects, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Upgrade USBX to version 6.4.3 or later as soon as it becomes available to ensure the vulnerability is patched. 2. Conduct an inventory of embedded devices and IoT systems using NetX Duo USBX to identify potentially affected assets. 3. Implement strict access controls to limit local access to embedded devices, reducing the attack surface. 4. Monitor USB HID device interactions and logs for anomalous behavior that could indicate exploitation attempts. 5. Where possible, apply input validation and boundary checks in custom USB HID parsing code to mitigate risks. 6. Collaborate with device manufacturers and suppliers to confirm firmware updates addressing this vulnerability. 7. For critical infrastructure, consider network segmentation and device isolation to contain potential exploitation. 8. Maintain up-to-date asset management and vulnerability scanning focused on embedded systems. 9. Educate operational technology (OT) personnel about this vulnerability and the importance of patching embedded USB stacks. 10. Prepare incident response plans specific to embedded device compromise scenarios.
Affected Countries
Germany, Netherlands, France, Italy, United Kingdom, Sweden, Finland
CVE-2025-55096: CWE-191 Integer Underflow (Wrap or Wraparound) in Eclipse Foundation NetX Duo
Description
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_hid_report_descriptor_get() when parsing a descriptor of an USB HID device.
AI-Powered Analysis
Technical Analysis
CVE-2025-55096 identifies an integer underflow vulnerability (CWE-191) in the USBX component of Eclipse Foundation's NetX Duo, specifically in versions prior to 6.4.3. The flaw exists in the function _ux_host_class_hid_report_descriptor_get(), which parses USB Human Interface Device (HID) report descriptors. An integer underflow during parsing can lead to an out-of-bounds read, potentially exposing sensitive memory contents or causing system instability. The vulnerability is local (attack vector: local), requires high attack complexity, and does not require privileges, authentication, or user interaction. The CVSS 4.0 base score is 2.1, reflecting a low severity due to limited impact and exploitation difficulty. No public exploits or widespread attacks have been reported. USBX is a USB host/device stack used primarily in embedded systems and IoT devices, often integrated with ThreadX RTOS. The vulnerability could affect embedded devices that rely on USB HID device communication, including industrial controllers, medical devices, or consumer electronics. The absence of a patch link suggests that remediation may require upgrading to USBX 6.4.3 or later once available. The flaw's exploitation could lead to information disclosure or denial of service due to memory corruption, but no code execution or privilege escalation is indicated. The vulnerability highlights the importance of robust input validation in USB descriptor parsing within embedded software stacks.
Potential Impact
For European organizations, the impact is primarily on embedded systems and IoT devices that incorporate the vulnerable USBX versions. Potential consequences include information leakage from out-of-bounds reads and possible device instability or crashes, which could disrupt operations in critical infrastructure, manufacturing, or healthcare sectors. Although the vulnerability requires local access and has high attack complexity, insider threats or compromised devices could exploit it. The limited severity and lack of known exploits reduce immediate risk, but unpatched devices in industrial control systems or medical equipment could face reliability issues or data exposure. European companies relying on embedded USB HID devices in their supply chains or products should assess exposure. The impact on confidentiality and availability is low to moderate, with integrity impact minimal. Operational disruptions in critical sectors could have cascading effects, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Upgrade USBX to version 6.4.3 or later as soon as it becomes available to ensure the vulnerability is patched. 2. Conduct an inventory of embedded devices and IoT systems using NetX Duo USBX to identify potentially affected assets. 3. Implement strict access controls to limit local access to embedded devices, reducing the attack surface. 4. Monitor USB HID device interactions and logs for anomalous behavior that could indicate exploitation attempts. 5. Where possible, apply input validation and boundary checks in custom USB HID parsing code to mitigate risks. 6. Collaborate with device manufacturers and suppliers to confirm firmware updates addressing this vulnerability. 7. For critical infrastructure, consider network segmentation and device isolation to contain potential exploitation. 8. Maintain up-to-date asset management and vulnerability scanning focused on embedded systems. 9. Educate operational technology (OT) personnel about this vulnerability and the importance of patching embedded USB stacks. 10. Prepare incident response plans specific to embedded device compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- eclipse
- Date Reserved
- 2025-08-06T18:56:43.458Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f1d5f59c34d0947ffa1173
Added to database: 10/17/2025, 5:36:53 AM
Last enriched: 10/17/2025, 5:46:45 AM
Last updated: 10/19/2025, 11:16:52 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.