CVE-2025-55089

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in FileX's RAM disk driver allows remote attackers to execute arbitrary code by sending specially crafted packets. This affects all systems running Eclipse Foundation ThreadX with FileX before version 6.4.2. The vulnerability is particularly dangerous for embedded systems and IoT devices using this file system component.

💻 Affected Systems

Products:
  • Eclipse Foundation ThreadX with FileX module
Versions: FileX versions before 6.4.2
Operating Systems: Any OS using Eclipse ThreadX with FileX
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using FileX RAM disk driver functionality. Embedded systems and IoT devices are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, device takeover, or lateral movement within networks.

🟠

Likely Case

Remote code execution allowing attackers to run arbitrary commands, potentially leading to data exfiltration or denial of service.

🟢

If Mitigated

Limited impact if network segmentation and proper access controls prevent malicious packets from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation without authentication, making internet-facing systems immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by attackers who gain network access, potentially leading to lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory describes a buffer overflow that can be triggered remotely via crafted packets, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FileX 6.4.2

Vendor Advisory: https://github.com/eclipse-threadx/filex/security/advisories/GHSA-467v-6j75-3j7g

Restart Required: Yes

Instructions:

1. Download FileX version 6.4.2 or later from the official repository. 2. Replace the vulnerable FileX module in your ThreadX implementation. 3. Recompile and redeploy the updated firmware/software. 4. Restart affected systems.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate systems using vulnerable FileX versions from untrusted networks

Disable RAM Disk Driver

all

If RAM disk functionality is not required, disable the vulnerable driver component

# In ThreadX configuration, set FX_RAM_DISK_ENABLE to 0

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with vulnerable systems
  • Deploy intrusion detection systems to monitor for exploitation attempts and anomalous packet patterns

🔍 How to Verify

Check if Vulnerable:

Check the FileX version in your ThreadX implementation. If using source code, examine the FX_VERSION_MAJOR and FX_VERSION_MINOR defines.

Check Version:

# Check FX_VERSION_MAJOR and FX_VERSION_MINOR in fx_api.h or similar header files

Verify Fix Applied:

Verify that FileX version is 6.4.2 or higher by checking the version defines or examining the compiled binary.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Memory access violations
  • Abnormal process creation from FileX-related services

Network Indicators:

  • Unusual packet patterns to FileX services
  • Traffic to unexpected ports from internal systems

SIEM Query:

source="*" ("FileX" AND ("crash" OR "buffer" OR "overflow")) OR (destination_port IN [FileX_service_ports] AND packet_size > normal_threshold)

🔗 References

📤 Share & Export