Sharing with community:
https://github.com/QubesOS/qubes-issues/issues/2597#issuecomment-274347172
NB! This thing requires that you have networking between windows HVM and your usbvm (or whatever the USB controller has been passed through to)
can other appvms bet attacked by the usbvm after this setup?
in my humble opinion, usbip from usbvm is bearable, but definitely not very good security-wise.
(it's a complex piece of software with obscure, occult behavior, and a daemon running as root on usbvm)
using it to take over the usbvm from a compromised windows box is definitely within possibility.
If your usbvm doesn't manage dom0's input devices and if it has no networking beyond windows-vm <-> usbvm path, attacker will be likely limited to dropping malware on flash drives you connect to usbvm and such
So IMHO (don't quote me on this) it's not very bad and most of increased susceptibility happens on windows7<->usbvm path
It's a trade-of (most things in life are :()