CVE-2025-55097: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_audio_streaming_sampling_get() when parsing a descriptor of an USB streaming device.
AI Analysis
Technical Summary
CVE-2025-55097 identifies an out-of-bounds read vulnerability classified under CWE-125 in the USBX component of the Eclipse Foundation's ThreadX real-time operating system. USBX provides USB host and device support for embedded systems, and this vulnerability specifically resides in the _ux_host_class_audio_streaming_sampling_get() function, which parses descriptors from USB audio streaming devices. The flaw arises when the function improperly handles descriptor data, leading to reading memory beyond the allocated buffer boundaries. Such out-of-bounds reads can cause undefined behavior including application crashes or potential leakage of sensitive memory contents. The vulnerability affects USBX versions prior to 6.4.3. Exploitation requires an attacker to connect a specially crafted malicious USB audio device to the target system. No authentication or user interaction is required, but physical access to the device is necessary. The CVSS 4.0 base score is 2.4, indicating low severity due to limited impact and attack vector requiring physical proximity. No known exploits have been reported in the wild as of the publication date. The vulnerability is relevant primarily to embedded systems and IoT devices using ThreadX with USBX for USB audio streaming support, which are common in industrial control, automotive infotainment, and medical devices. The lack of a patch link suggests that users should upgrade to USBX 6.4.3 or later once available. The vulnerability does not affect confidentiality, integrity, or availability at a high level but could cause minor disruptions or information leakage in constrained environments.
Potential Impact
For European organizations, the impact of CVE-2025-55097 is generally low but context-dependent. Embedded systems and IoT devices running ThreadX with USBX are prevalent in sectors such as automotive manufacturing, industrial automation, and healthcare equipment. An attacker with physical access could exploit this vulnerability by connecting a malicious USB audio device, potentially causing device crashes or limited information disclosure. This could disrupt critical operations or leak sensitive data in safety-critical environments. While the vulnerability does not allow remote exploitation or privilege escalation, the physical access requirement limits the attack surface. However, in environments with many connected embedded devices, such as factories or hospitals, the risk of insider threats or supply chain attacks increases. European organizations with stringent safety and compliance requirements must consider this vulnerability as part of their embedded device security posture. Failure to address it could lead to operational downtime or minor data leaks, impacting business continuity and regulatory compliance.
Mitigation Recommendations
1. Upgrade USBX to version 6.4.3 or later as soon as the patch becomes available to eliminate the out-of-bounds read vulnerability. 2. Implement strict USB device control policies to restrict connection of unauthorized USB devices, especially in sensitive environments. 3. Employ hardware-based USB port lockdown or disable unused USB ports on embedded devices to reduce physical attack vectors. 4. Conduct regular security audits and firmware integrity checks on embedded systems running ThreadX to detect unauthorized modifications. 5. Use device whitelisting and endpoint security solutions tailored for embedded and IoT environments to monitor USB device interactions. 6. Educate operational technology (OT) personnel about the risks of connecting untrusted USB devices to critical systems. 7. Collaborate with device vendors to ensure timely firmware updates and security patches are applied. 8. Consider network segmentation and monitoring to isolate embedded devices and detect anomalous behavior resulting from exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden
CVE-2025-55097: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
Description
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_audio_streaming_sampling_get() when parsing a descriptor of an USB streaming device.
AI-Powered Analysis
Technical Analysis
CVE-2025-55097 identifies an out-of-bounds read vulnerability classified under CWE-125 in the USBX component of the Eclipse Foundation's ThreadX real-time operating system. USBX provides USB host and device support for embedded systems, and this vulnerability specifically resides in the _ux_host_class_audio_streaming_sampling_get() function, which parses descriptors from USB audio streaming devices. The flaw arises when the function improperly handles descriptor data, leading to reading memory beyond the allocated buffer boundaries. Such out-of-bounds reads can cause undefined behavior including application crashes or potential leakage of sensitive memory contents. The vulnerability affects USBX versions prior to 6.4.3. Exploitation requires an attacker to connect a specially crafted malicious USB audio device to the target system. No authentication or user interaction is required, but physical access to the device is necessary. The CVSS 4.0 base score is 2.4, indicating low severity due to limited impact and attack vector requiring physical proximity. No known exploits have been reported in the wild as of the publication date. The vulnerability is relevant primarily to embedded systems and IoT devices using ThreadX with USBX for USB audio streaming support, which are common in industrial control, automotive infotainment, and medical devices. The lack of a patch link suggests that users should upgrade to USBX 6.4.3 or later once available. The vulnerability does not affect confidentiality, integrity, or availability at a high level but could cause minor disruptions or information leakage in constrained environments.
Potential Impact
For European organizations, the impact of CVE-2025-55097 is generally low but context-dependent. Embedded systems and IoT devices running ThreadX with USBX are prevalent in sectors such as automotive manufacturing, industrial automation, and healthcare equipment. An attacker with physical access could exploit this vulnerability by connecting a malicious USB audio device, potentially causing device crashes or limited information disclosure. This could disrupt critical operations or leak sensitive data in safety-critical environments. While the vulnerability does not allow remote exploitation or privilege escalation, the physical access requirement limits the attack surface. However, in environments with many connected embedded devices, such as factories or hospitals, the risk of insider threats or supply chain attacks increases. European organizations with stringent safety and compliance requirements must consider this vulnerability as part of their embedded device security posture. Failure to address it could lead to operational downtime or minor data leaks, impacting business continuity and regulatory compliance.
Mitigation Recommendations
1. Upgrade USBX to version 6.4.3 or later as soon as the patch becomes available to eliminate the out-of-bounds read vulnerability. 2. Implement strict USB device control policies to restrict connection of unauthorized USB devices, especially in sensitive environments. 3. Employ hardware-based USB port lockdown or disable unused USB ports on embedded devices to reduce physical attack vectors. 4. Conduct regular security audits and firmware integrity checks on embedded systems running ThreadX to detect unauthorized modifications. 5. Use device whitelisting and endpoint security solutions tailored for embedded and IoT environments to monitor USB device interactions. 6. Educate operational technology (OT) personnel about the risks of connecting untrusted USB devices to critical systems. 7. Collaborate with device vendors to ensure timely firmware updates and security patches are applied. 8. Consider network segmentation and monitoring to isolate embedded devices and detect anomalous behavior resulting from exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- eclipse
- Date Reserved
- 2025-08-06T18:56:43.458Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f1d8459c34d0947ffb7eaf
Added to database: 10/17/2025, 5:46:45 AM
Last enriched: 10/17/2025, 6:02:43 AM
Last updated: 10/19/2025, 9:56:29 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.