CVE-2024-50595: CWE-191: Integer Underflow (Wrap or Wraparound) in STMicroelectronics X-CUBE-AZRT-H7RS
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted series of network requests can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
AI Analysis
Technical Summary
CVE-2024-50595 identifies an integer underflow vulnerability (CWE-191) in the HTTP server PUT request functionality of the STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 software package, specifically within the NetX Duo Component HTTP Server implementation (file nxd_http_server.c). The vulnerability arises due to improper handling of integer values during processing of PUT requests, where a specially crafted sequence of network packets can cause an integer underflow (wraparound). This underflow can lead to memory corruption or logic errors that result in denial of service (DoS) conditions, such as crashing the HTTP server or causing it to become unresponsive. The flaw requires an attacker to have network access and low privileges (PR:L), but no user interaction is necessary (UI:N). The vulnerability affects version 1.0.0 of the X-CUBE-AZRT-H7RS middleware, which is used in embedded systems leveraging STMicroelectronics’ real-time operating system and networking stacks. Although no public exploits are known, the vulnerability could be leveraged in targeted attacks to disrupt availability of critical IoT or industrial control devices that rely on this middleware. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to its impact on availability without affecting confidentiality or integrity. The vulnerability was published on April 2, 2025, and no patches or mitigations have been officially released at the time of this report.
Potential Impact
The primary impact of CVE-2024-50595 is denial of service, which can disrupt the availability of embedded devices running STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 with the vulnerable NetX Duo HTTP server. For European organizations, this could affect industrial automation systems, IoT devices, and critical infrastructure components that use this middleware, potentially leading to operational downtime, loss of productivity, or safety risks if control systems become unresponsive. Although the vulnerability does not compromise data confidentiality or integrity, the loss of service could have cascading effects in environments where continuous device availability is critical. The medium severity rating reflects that exploitation requires network access and low privileges but no user interaction, making it feasible for attackers with internal network presence or access to exposed devices. The lack of known exploits reduces immediate risk, but the potential for targeted disruption in sectors such as manufacturing, energy, or transportation is notable.
Mitigation Recommendations
European organizations should first identify any embedded systems or IoT devices using STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 or specifically the X-CUBE-AZRT-H7RS middleware. Network segmentation and strict access controls should be implemented to limit exposure of vulnerable devices to untrusted networks. Monitoring network traffic for unusual PUT request patterns targeting HTTP servers on these devices can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with STMicroelectronics for updates or workarounds. Where feasible, disabling or restricting HTTP PUT functionality on affected devices can reduce attack surface. Additionally, implementing rate limiting and anomaly detection on network interfaces can mitigate the risk of denial of service. Finally, incorporating these devices into vulnerability management and incident response plans will improve preparedness against exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2024-50595: CWE-191: Integer Underflow (Wrap or Wraparound) in STMicroelectronics X-CUBE-AZRT-H7RS
Description
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted series of network requests can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
AI-Powered Analysis
Technical Analysis
CVE-2024-50595 identifies an integer underflow vulnerability (CWE-191) in the HTTP server PUT request functionality of the STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 software package, specifically within the NetX Duo Component HTTP Server implementation (file nxd_http_server.c). The vulnerability arises due to improper handling of integer values during processing of PUT requests, where a specially crafted sequence of network packets can cause an integer underflow (wraparound). This underflow can lead to memory corruption or logic errors that result in denial of service (DoS) conditions, such as crashing the HTTP server or causing it to become unresponsive. The flaw requires an attacker to have network access and low privileges (PR:L), but no user interaction is necessary (UI:N). The vulnerability affects version 1.0.0 of the X-CUBE-AZRT-H7RS middleware, which is used in embedded systems leveraging STMicroelectronics’ real-time operating system and networking stacks. Although no public exploits are known, the vulnerability could be leveraged in targeted attacks to disrupt availability of critical IoT or industrial control devices that rely on this middleware. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to its impact on availability without affecting confidentiality or integrity. The vulnerability was published on April 2, 2025, and no patches or mitigations have been officially released at the time of this report.
Potential Impact
The primary impact of CVE-2024-50595 is denial of service, which can disrupt the availability of embedded devices running STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 with the vulnerable NetX Duo HTTP server. For European organizations, this could affect industrial automation systems, IoT devices, and critical infrastructure components that use this middleware, potentially leading to operational downtime, loss of productivity, or safety risks if control systems become unresponsive. Although the vulnerability does not compromise data confidentiality or integrity, the loss of service could have cascading effects in environments where continuous device availability is critical. The medium severity rating reflects that exploitation requires network access and low privileges but no user interaction, making it feasible for attackers with internal network presence or access to exposed devices. The lack of known exploits reduces immediate risk, but the potential for targeted disruption in sectors such as manufacturing, energy, or transportation is notable.
Mitigation Recommendations
European organizations should first identify any embedded systems or IoT devices using STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0 or specifically the X-CUBE-AZRT-H7RS middleware. Network segmentation and strict access controls should be implemented to limit exposure of vulnerable devices to untrusted networks. Monitoring network traffic for unusual PUT request patterns targeting HTTP servers on these devices can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with STMicroelectronics for updates or workarounds. Where feasible, disabling or restricting HTTP PUT functionality on affected devices can reduce attack surface. Additionally, implementing rate limiting and anomaly detection on network interfaces can mitigate the risk of denial of service. Finally, incorporating these devices into vulnerability management and incident response plans will improve preparedness against exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-10-25T19:20:51.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690908517fff0e30cee235a0
Added to database: 11/3/2025, 7:53:53 PM
Last enriched: 11/3/2025, 7:59:49 PM
Last updated: 11/5/2025, 1:51:14 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.