Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50384: CWE-459: Incomplete Cleanup in STMicroelectronics X-CUBE-AZRT-H7RS

0
Medium
VulnerabilityCVE-2024-50384cvecve-2024-50384cwe-459
Published: Wed Apr 02 2025 (04/02/2025, 13:41:57 UTC)
Source: CVE Database V5
Vendor/Project: STMicroelectronics
Product: X-CUBE-AZRT-H7RS

Description

A denial of service vulnerability exists in the NetX Component HTTP server functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects X-CUBE-AZRTOS-F7 NetX Duo Web Component HTTP server v 1.1.0. This HTTP server implementation is contained in this file - x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\web\nx_web_http_server.c

AI-Powered Analysis

AILast updated: 11/03/2025, 19:58:58 UTC

Technical Analysis

CVE-2024-50384 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting the HTTP server functionality within the NetX Duo Web Component of STMicroelectronics X-CUBE-AZRTOS-F7 middleware, specifically version 1.1.0. The vulnerability exists in the file nx_web_http_server.c, where improper resource cleanup after processing certain network packets can lead to a denial of service (DoS) condition. An attacker with network access and low privileges can send a specially crafted HTTP request that triggers this incomplete cleanup, causing the server to become unresponsive or crash, thus denying legitimate users access to the service. The vulnerability does not require user interaction and does not impact confidentiality or integrity, focusing solely on availability. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges required beyond network access. No public exploits or patches are currently available, indicating that organizations must rely on compensating controls until an official fix is released. The affected middleware is embedded in various real-time operating system environments used in industrial control, automotive systems, and IoT devices, making it a concern for embedded device manufacturers and operators.

Potential Impact

For European organizations, the primary impact is service disruption due to denial of service conditions in embedded devices running the vulnerable HTTP server component. This can affect industrial automation systems, automotive control units, and IoT devices that rely on STMicroelectronics X-CUBE-AZRTOS middleware. Disruptions could lead to operational downtime, safety risks in critical infrastructure, and potential cascading effects in manufacturing or transportation sectors. Since the vulnerability does not expose data or allow code execution, the risk to confidentiality and integrity is low. However, availability impacts in critical systems can have significant operational and financial consequences. The lack of patches increases the window of exposure, and attackers could exploit this vulnerability to cause targeted outages or as part of multi-stage attacks against industrial environments.

Mitigation Recommendations

1. Implement network segmentation and restrict access to devices running the vulnerable HTTP server to trusted networks only. 2. Deploy firewall rules or intrusion prevention systems (IPS) to detect and block malformed HTTP requests targeting the vulnerable component. 3. Monitor network traffic for unusual or malformed HTTP packets that could indicate exploitation attempts. 4. Coordinate with device manufacturers and STMicroelectronics for timely updates and patches once available. 5. Where possible, disable or limit the HTTP server functionality on embedded devices if not required for operation. 6. Conduct regular security assessments and penetration testing on embedded systems to identify exposure. 7. Employ redundancy and failover mechanisms in critical systems to mitigate the impact of potential denial of service events.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-10-23T18:58:47.945Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690908517fff0e30cee23594

Added to database: 11/3/2025, 7:53:53 PM

Last enriched: 11/3/2025, 7:58:58 PM

Last updated: 11/5/2025, 1:50:52 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats