CVE-2025-55100: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_audio10_sam_parse_func() when parsing a list of sampling frequencies.
AI Analysis
Technical Summary
CVE-2025-55100 identifies an out-of-bounds read vulnerability (CWE-125) in the USBX component of the Eclipse Foundation's ThreadX real-time operating system, specifically in versions before 6.4.3. The issue resides in the _ux_host_class_audio10_sam_parse_func() function, which parses a list of sampling frequencies for USB audio devices. An out-of-bounds read occurs when the function improperly handles the length or content of the sampling frequency list, potentially reading memory beyond the allocated buffer. This can lead to unintended disclosure of memory contents or cause application crashes due to invalid memory access. The vulnerability requires physical proximity or local access since the attack vector is physical, and user interaction is necessary, such as connecting a malicious USB audio device. No privileges or authentication are required to trigger the vulnerability. The CVSS 4.0 score is 2.4, reflecting low severity, mainly due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vendor updates. The vulnerability affects embedded systems and IoT devices using ThreadX with USBX for USB audio support, which are common in industrial, automotive, and consumer electronics sectors.
Potential Impact
For European organizations, the impact of CVE-2025-55100 is generally low but context-dependent. Devices running ThreadX with USBX prior to version 6.4.3 that handle USB audio input could be vulnerable to memory disclosure or instability if exposed to malicious USB devices. This could lead to leakage of sensitive information residing in memory or denial of service conditions if the device crashes. Sectors such as manufacturing, automotive, healthcare, and critical infrastructure that deploy embedded systems with USB audio capabilities may face operational disruptions or data confidentiality risks. However, the requirement for physical access and user interaction limits remote exploitation and large-scale attacks. The vulnerability does not enable code execution or privilege escalation, reducing the risk of more severe compromises. Nonetheless, organizations should consider the potential for targeted attacks or supply chain risks involving malicious USB devices.
Mitigation Recommendations
European organizations should proactively monitor for updates from the Eclipse Foundation and apply patches to USBX to upgrade to version 6.4.3 or later once available. Until patches are deployed, organizations should implement strict USB device control policies, including disabling unused USB ports, restricting USB device types allowed, and using endpoint security solutions that can detect anomalous USB device behavior. Employ hardware-based USB port locks or physical security controls to prevent unauthorized device connections. Additionally, validate and sanitize USB audio data inputs at the application level where possible. Conduct security awareness training to inform users about the risks of connecting untrusted USB devices. For critical embedded systems, consider network segmentation and monitoring to detect abnormal device behavior that could indicate exploitation attempts. Finally, collaborate with device manufacturers to ensure secure firmware updates and vulnerability management.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden
CVE-2025-55100: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
Description
In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_audio10_sam_parse_func() when parsing a list of sampling frequencies.
AI-Powered Analysis
Technical Analysis
CVE-2025-55100 identifies an out-of-bounds read vulnerability (CWE-125) in the USBX component of the Eclipse Foundation's ThreadX real-time operating system, specifically in versions before 6.4.3. The issue resides in the _ux_host_class_audio10_sam_parse_func() function, which parses a list of sampling frequencies for USB audio devices. An out-of-bounds read occurs when the function improperly handles the length or content of the sampling frequency list, potentially reading memory beyond the allocated buffer. This can lead to unintended disclosure of memory contents or cause application crashes due to invalid memory access. The vulnerability requires physical proximity or local access since the attack vector is physical, and user interaction is necessary, such as connecting a malicious USB audio device. No privileges or authentication are required to trigger the vulnerability. The CVSS 4.0 score is 2.4, reflecting low severity, mainly due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vendor updates. The vulnerability affects embedded systems and IoT devices using ThreadX with USBX for USB audio support, which are common in industrial, automotive, and consumer electronics sectors.
Potential Impact
For European organizations, the impact of CVE-2025-55100 is generally low but context-dependent. Devices running ThreadX with USBX prior to version 6.4.3 that handle USB audio input could be vulnerable to memory disclosure or instability if exposed to malicious USB devices. This could lead to leakage of sensitive information residing in memory or denial of service conditions if the device crashes. Sectors such as manufacturing, automotive, healthcare, and critical infrastructure that deploy embedded systems with USB audio capabilities may face operational disruptions or data confidentiality risks. However, the requirement for physical access and user interaction limits remote exploitation and large-scale attacks. The vulnerability does not enable code execution or privilege escalation, reducing the risk of more severe compromises. Nonetheless, organizations should consider the potential for targeted attacks or supply chain risks involving malicious USB devices.
Mitigation Recommendations
European organizations should proactively monitor for updates from the Eclipse Foundation and apply patches to USBX to upgrade to version 6.4.3 or later once available. Until patches are deployed, organizations should implement strict USB device control policies, including disabling unused USB ports, restricting USB device types allowed, and using endpoint security solutions that can detect anomalous USB device behavior. Employ hardware-based USB port locks or physical security controls to prevent unauthorized device connections. Additionally, validate and sanitize USB audio data inputs at the application level where possible. Conduct security awareness training to inform users about the risks of connecting untrusted USB devices. For critical embedded systems, consider network segmentation and monitoring to detect abnormal device behavior that could indicate exploitation attempts. Finally, collaborate with device manufacturers to ensure secure firmware updates and vulnerability management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- eclipse
- Date Reserved
- 2025-08-06T18:56:43.458Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f1d8459c34d0947ffb7eb8
Added to database: 10/17/2025, 5:46:45 AM
Last enriched: 10/17/2025, 6:01:47 AM
Last updated: 10/19/2025, 10:10:38 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.