CVE-2025-55080
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-15

Last updated on: 2025-10-22

Assigner: Eclipse Foundation

Description
In Eclipse ThreadX before 6.4.3, when memory protection is enabled, syscall parameters verification wasn't enough, allowing an attacker to obtain an arbitrary memory read/write.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-15
Last Modified
2025-10-22
Generated
2026-05-07
AI Q&A
2025-10-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eclipse threadx to 6.4.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-233 The product does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-55080 is a high-severity vulnerability in Eclipse ThreadX versions before 6.4.3 that occurs when memory protection is enabled. The issue arises from improper verification of syscall parameters due to incorrect logic in macros responsible for validating kernel object pointers. This flaw allows attackers with local access and low privileges to bypass user-kernel isolation checks, enabling arbitrary memory read and write operations and privilege escalation. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with local access and low privileges to escalate their privileges and perform arbitrary memory read and write operations. This compromises the confidentiality and integrity of the system by allowing unauthorized access and modification of memory, potentially leading to further exploitation or system compromise. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is related to improper parameter checks in the syscall implementation of Eclipse ThreadX before version 6.4.3 when memory protection is enabled. Detection involves verifying the ThreadX version in use and checking for the presence of the vulnerable macros in the source code if accessible. Since the vulnerability requires local access and involves kernel object pointer validation, network-based detection commands are not applicable. To detect if your system is vulnerable, check the ThreadX version with your system's version query commands or inspect the source code for the presence of the flawed macros. Specific commands depend on your environment but generally include checking the ThreadX version or firmware version. For example, on a device running ThreadX, you might use commands or logs that reveal the OS version. No direct commands for detecting exploitation attempts are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Eclipse ThreadX to version 6.4.3 or later, where the vulnerability has been patched by correcting the logic in the parameter check macros. If upgrading is not immediately possible, restrict local access to the system to trusted users only, as exploitation requires local access with low privileges. Additionally, review and apply any available patches or workarounds provided by Eclipse ThreadX maintainers. Ensuring memory protection is properly configured and monitoring for unusual local activity may also help mitigate risk until the patch is applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart