CVE-2025-55100

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to read memory beyond allocated boundaries in USBX's audio class parsing function. It affects systems using Eclipse ThreadX with USBX before version 6.4.3, potentially leading to information disclosure or system crashes. Embedded devices and IoT systems using ThreadX with USB audio support are primarily affected.

💻 Affected Systems

Products:
  • Eclipse ThreadX USBX module
Versions: USBX versions before 6.4.3
Operating Systems: Any OS using Eclipse ThreadX with USBX
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with USB audio class support enabled in USBX configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though this requires additional memory corruption vulnerabilities to be chained together.

🟠

Likely Case

System crash (denial of service) or information disclosure from adjacent memory regions.

🟢

If Mitigated

Limited impact with proper memory protections and exploit mitigations in place.

🌐 Internet-Facing: MEDIUM - Requires USB audio device connection which is typically local, but could be exploited via malicious USB devices or USB-over-network solutions.
🏢 Internal Only: MEDIUM - Exploitation requires physical USB access or USB redirection capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires connecting a malicious USB audio device or manipulating USB audio descriptors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: USBX 6.4.3

Vendor Advisory: https://github.com/eclipse-threadx/usbx/security/advisories/GHSA-j253-w29r-9m48

Restart Required: Yes

Instructions:

1. Update USBX to version 6.4.3 or later. 2. Rebuild ThreadX with updated USBX. 3. Deploy updated firmware to affected devices. 4. Restart devices to apply changes.

🔧 Temporary Workarounds

Disable USB Audio Class

all

Disable USB audio class support in USBX configuration if not required

Modify USBX configuration to disable UX_HOST_CLASS_AUDIO_ENABLE

USB Device Whitelisting

all

Implement USB device authorization policies to block untrusted USB audio devices

🧯 If You Can't Patch

  • Implement strict USB device control policies and physical security measures
  • Deploy network segmentation to isolate vulnerable devices from critical systems

🔍 How to Verify

Check if Vulnerable:

Check USBX version in ThreadX build configuration or firmware version string

Check Version:

Check firmware documentation or build configuration for USBX_VERSION define

Verify Fix Applied:

Verify USBX version is 6.4.3 or later in firmware/configuration

📡 Detection & Monitoring

Log Indicators:

  • USB audio device connection failures
  • System crashes after USB audio device connection
  • Memory access violation logs

Network Indicators:

  • Unexpected USB device connections via USB-over-IP solutions

SIEM Query:

Search for USB device connection events followed by system crashes or memory errors

🔗 References

📤 Share & Export