CVE-2024-50384: CWE-459: Incomplete Cleanup in STMicroelectronics X-CUBE-AZRT-H7RS
A denial of service vulnerability exists in the NetX Component HTTP server functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects X-CUBE-AZRTOS-F7 NetX Duo Web Component HTTP server v 1.1.0. This HTTP server implementation is contained in this file - x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\web\nx_web_http_server.c
AI Analysis
Technical Summary
CVE-2024-50384 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting the HTTP server functionality within the NetX Duo Web Component of STMicroelectronics X-CUBE-AZRTOS-F7 middleware, specifically version 1.1.0. The vulnerability exists in the file nx_web_http_server.c, where improper resource cleanup after processing certain network packets can lead to a denial of service (DoS) condition. An attacker with network access and low privileges can send a specially crafted HTTP request that triggers this incomplete cleanup, causing the server to become unresponsive or crash, thus denying legitimate users access to the service. The vulnerability does not require user interaction and does not impact confidentiality or integrity, focusing solely on availability. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges required beyond network access. No public exploits or patches are currently available, indicating that organizations must rely on compensating controls until an official fix is released. The affected middleware is embedded in various real-time operating system environments used in industrial control, automotive systems, and IoT devices, making it a concern for embedded device manufacturers and operators.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service conditions in embedded devices running the vulnerable HTTP server component. This can affect industrial automation systems, automotive control units, and IoT devices that rely on STMicroelectronics X-CUBE-AZRTOS middleware. Disruptions could lead to operational downtime, safety risks in critical infrastructure, and potential cascading effects in manufacturing or transportation sectors. Since the vulnerability does not expose data or allow code execution, the risk to confidentiality and integrity is low. However, availability impacts in critical systems can have significant operational and financial consequences. The lack of patches increases the window of exposure, and attackers could exploit this vulnerability to cause targeted outages or as part of multi-stage attacks against industrial environments.
Mitigation Recommendations
1. Implement network segmentation and restrict access to devices running the vulnerable HTTP server to trusted networks only. 2. Deploy firewall rules or intrusion prevention systems (IPS) to detect and block malformed HTTP requests targeting the vulnerable component. 3. Monitor network traffic for unusual or malformed HTTP packets that could indicate exploitation attempts. 4. Coordinate with device manufacturers and STMicroelectronics for timely updates and patches once available. 5. Where possible, disable or limit the HTTP server functionality on embedded devices if not required for operation. 6. Conduct regular security assessments and penetration testing on embedded systems to identify exposure. 7. Employ redundancy and failover mechanisms in critical systems to mitigate the impact of potential denial of service events.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2024-50384: CWE-459: Incomplete Cleanup in STMicroelectronics X-CUBE-AZRT-H7RS
Description
A denial of service vulnerability exists in the NetX Component HTTP server functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects X-CUBE-AZRTOS-F7 NetX Duo Web Component HTTP server v 1.1.0. This HTTP server implementation is contained in this file - x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\web\nx_web_http_server.c
AI-Powered Analysis
Technical Analysis
CVE-2024-50384 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting the HTTP server functionality within the NetX Duo Web Component of STMicroelectronics X-CUBE-AZRTOS-F7 middleware, specifically version 1.1.0. The vulnerability exists in the file nx_web_http_server.c, where improper resource cleanup after processing certain network packets can lead to a denial of service (DoS) condition. An attacker with network access and low privileges can send a specially crafted HTTP request that triggers this incomplete cleanup, causing the server to become unresponsive or crash, thus denying legitimate users access to the service. The vulnerability does not require user interaction and does not impact confidentiality or integrity, focusing solely on availability. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges required beyond network access. No public exploits or patches are currently available, indicating that organizations must rely on compensating controls until an official fix is released. The affected middleware is embedded in various real-time operating system environments used in industrial control, automotive systems, and IoT devices, making it a concern for embedded device manufacturers and operators.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service conditions in embedded devices running the vulnerable HTTP server component. This can affect industrial automation systems, automotive control units, and IoT devices that rely on STMicroelectronics X-CUBE-AZRTOS middleware. Disruptions could lead to operational downtime, safety risks in critical infrastructure, and potential cascading effects in manufacturing or transportation sectors. Since the vulnerability does not expose data or allow code execution, the risk to confidentiality and integrity is low. However, availability impacts in critical systems can have significant operational and financial consequences. The lack of patches increases the window of exposure, and attackers could exploit this vulnerability to cause targeted outages or as part of multi-stage attacks against industrial environments.
Mitigation Recommendations
1. Implement network segmentation and restrict access to devices running the vulnerable HTTP server to trusted networks only. 2. Deploy firewall rules or intrusion prevention systems (IPS) to detect and block malformed HTTP requests targeting the vulnerable component. 3. Monitor network traffic for unusual or malformed HTTP packets that could indicate exploitation attempts. 4. Coordinate with device manufacturers and STMicroelectronics for timely updates and patches once available. 5. Where possible, disable or limit the HTTP server functionality on embedded devices if not required for operation. 6. Conduct regular security assessments and penetration testing on embedded systems to identify exposure. 7. Employ redundancy and failover mechanisms in critical systems to mitigate the impact of potential denial of service events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-10-23T18:58:47.945Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690908517fff0e30cee23594
Added to database: 11/3/2025, 7:53:53 PM
Last enriched: 11/3/2025, 7:58:58 PM
Last updated: 11/5/2025, 1:50:52 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.