Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21740: n/a

0
High
VulnerabilityCVE-2024-21740cvecve-2024-21740
Published: Tue Jun 25 2024 (06/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Artery AT32F415CBT7 and AT32F421C8T7 devices have Incorrect Access Control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:06:49 UTC

Technical Analysis

CVE-2024-21740 identifies an incorrect access control vulnerability in Artery AT32F415CBT7 and AT32F421C8T7 microcontroller devices. These devices are embedded systems components commonly used in industrial control, IoT, and consumer electronics. The vulnerability arises from improper enforcement of access control policies, allowing unauthorized local attackers to execute actions that compromise the device's confidentiality, integrity, and availability. The CVSS v3.1 score of 7.4 reflects a high severity level, with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker with physical or local network access could exploit the flaw to gain unauthorized control or disrupt device operations. The vulnerability is categorized under CWE-284, which involves improper access control, indicating that the device's security mechanisms fail to adequately restrict access to sensitive functions or data. No patches or firmware updates have been published yet, and no known exploits are reported in the wild, but the risk remains significant given the potential impact. Organizations deploying these microcontrollers in critical systems should be aware of the vulnerability and take proactive steps to mitigate risk until a fix is available.

Potential Impact

The vulnerability poses a significant risk to organizations using Artery AT32F415CBT7 and AT32F421C8T7 devices, especially in industrial, IoT, and embedded system contexts. Exploitation could lead to unauthorized disclosure of sensitive information, manipulation or corruption of device functions, and denial of service, potentially disrupting critical operations. Given the high impact on confidentiality, integrity, and availability, attackers could gain control over affected devices, leading to broader network compromise or operational failures. The requirement for local access limits remote exploitation but does not eliminate risk, as attackers with physical access or through compromised local networks could leverage this flaw. The absence of patches increases exposure time, making it imperative for organizations to implement compensating controls. The vulnerability could affect supply chains, manufacturing processes, and critical infrastructure relying on these microcontrollers, amplifying potential economic and safety consequences.

Mitigation Recommendations

Until official patches or firmware updates are released, organizations should implement strict physical security controls to prevent unauthorized local access to devices containing the affected microcontrollers. Network segmentation should be enforced to isolate critical embedded systems from general user networks, reducing the risk of local network-based exploitation. Continuous monitoring and logging of device access and behavior can help detect suspicious activities early. Device inventories should be updated to identify all deployments of the affected models, enabling targeted risk assessments. Where possible, disable or restrict unused interfaces and services on the devices to minimize attack surfaces. Engage with the vendor or manufacturer for updates on patch availability and apply firmware updates promptly once released. Additionally, consider deploying intrusion detection systems tailored for embedded environments and conduct regular security audits to ensure compliance with access control policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d49b7ef31ef0b56ffb2

Added to database: 2/25/2026, 9:44:41 PM

Last enriched: 2/28/2026, 9:06:49 AM

Last updated: 4/12/2026, 1:59:00 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses