CVE-2022-29223

HIGH

Azure RTOS USBX <6.1.10 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. In versions prior to 6.1.10, an attacker can cause a buffer overflow by providing the Azure RTOS USBX host stack a HUB descriptor with `bNbPorts` set to a value greater than `UX_MAX_TT` which defaults to 8. For a `bNbPorts` value of 255, the implementation of `ux_host_class_hub_descriptor_get` function will modify the contents of `hub` -> `ux_host_class_hub_device` -> `ux_device_hub_tt` array violating the end boundary by 255 - `UX_MAX_TT` items. The USB host stack needs to validate the number of ports reported by the hub, and if the value is larger than UX_MAX_TT, USB stack needs to reject the request. This fix has been included in USBX release 6.1.10.

References (2)

Core 2
Core References
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/azure-rtos/usbx/security/advisories/GHSA-2qc5-385m-x862
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/azure-rtos/usbx/releases/tag/v6.1.10_rel

Scores

CVSS v3 7.5
EPSS 0.0037
EPSS Percentile 58.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (1)
eclipse/threadx_usbx < 6.1.10
Published May 24, 2022
Tracked Since Feb 18, 2026