CVE-2025-55100
📋 TL;DR
This vulnerability allows attackers to read memory beyond allocated boundaries in USBX's audio class parsing function. It affects systems using Eclipse ThreadX with USBX before version 6.4.3, potentially leading to information disclosure or system crashes. Embedded devices and IoT systems using ThreadX with USB audio support are primarily affected.
💻 Affected Systems
- Eclipse ThreadX USBX module
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, though this requires additional memory corruption vulnerabilities to be chained together.
Likely Case
System crash (denial of service) or information disclosure from adjacent memory regions.
If Mitigated
Limited impact with proper memory protections and exploit mitigations in place.
🎯 Exploit Status
Exploitation requires connecting a malicious USB audio device or manipulating USB audio descriptors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: USBX 6.4.3
Vendor Advisory: https://github.com/eclipse-threadx/usbx/security/advisories/GHSA-j253-w29r-9m48
Restart Required: Yes
Instructions:
1. Update USBX to version 6.4.3 or later. 2. Rebuild ThreadX with updated USBX. 3. Deploy updated firmware to affected devices. 4. Restart devices to apply changes.
🔧 Temporary Workarounds
Disable USB Audio Class
allDisable USB audio class support in USBX configuration if not required
Modify USBX configuration to disable UX_HOST_CLASS_AUDIO_ENABLE
USB Device Whitelisting
allImplement USB device authorization policies to block untrusted USB audio devices
🧯 If You Can't Patch
- Implement strict USB device control policies and physical security measures
- Deploy network segmentation to isolate vulnerable devices from critical systems
🔍 How to Verify
Check if Vulnerable:
Check USBX version in ThreadX build configuration or firmware version string
Check Version:
Check firmware documentation or build configuration for USBX_VERSION define
Verify Fix Applied:
Verify USBX version is 6.4.3 or later in firmware/configuration
📡 Detection & Monitoring
Log Indicators:
- USB audio device connection failures
- System crashes after USB audio device connection
- Memory access violation logs
Network Indicators:
- Unexpected USB device connections via USB-over-IP solutions
SIEM Query:
Search for USB device connection events followed by system crashes or memory errors