CVE-2025-55080
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-22
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | threadx | to 6.4.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-233 | The product does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-55080 is a high-severity vulnerability in Eclipse ThreadX versions before 6.4.3 that occurs when memory protection is enabled. The issue arises from improper verification of syscall parameters due to incorrect logic in macros responsible for validating kernel object pointers. This flaw allows attackers with local access and low privileges to bypass user-kernel isolation checks, enabling arbitrary memory read and write operations and privilege escalation. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access and low privileges to escalate their privileges and perform arbitrary memory read and write operations. This compromises the confidentiality and integrity of the system by allowing unauthorized access and modification of memory, potentially leading to further exploitation or system compromise. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is related to improper parameter checks in the syscall implementation of Eclipse ThreadX before version 6.4.3 when memory protection is enabled. Detection involves verifying the ThreadX version in use and checking for the presence of the vulnerable macros in the source code if accessible. Since the vulnerability requires local access and involves kernel object pointer validation, network-based detection commands are not applicable. To detect if your system is vulnerable, check the ThreadX version with your system's version query commands or inspect the source code for the presence of the flawed macros. Specific commands depend on your environment but generally include checking the ThreadX version or firmware version. For example, on a device running ThreadX, you might use commands or logs that reveal the OS version. No direct commands for detecting exploitation attempts are provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Eclipse ThreadX to version 6.4.3 or later, where the vulnerability has been patched by correcting the logic in the parameter check macros. If upgrading is not immediately possible, restrict local access to the system to trusted users only, as exploitation requires local access with low privileges. Additionally, review and apply any available patches or workarounds provided by Eclipse ThreadX maintainers. Ensuring memory protection is properly configured and monitoring for unusual local activity may also help mitigate risk until the patch is applied. [1]