CVE-2024-50597: CWE-191: Integer Underflow (Wrap or Wraparound) in STMicroelectronics X-CUBE-AZRT-H7RS
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
AI Analysis
Technical Summary
CVE-2024-50597 identifies an integer underflow vulnerability categorized under CWE-191 in the HTTP server PUT request functionality of STMicroelectronics' X-CUBE-AZRTOS-WL 2.0.0 middleware package. The flaw resides in the NetX Duo component's HTTP server implementation, specifically in the source file nxd_http_server.c. When processing a PUT request, the code improperly handles integer values, allowing a crafted network packet to cause an underflow condition. This underflow can lead to memory corruption or logic errors that result in denial of service by crashing or halting the HTTP server process. The vulnerability requires only network access and low privileges (PR:L), with no user interaction needed. The scope is unchanged (S:U), and the impact affects availability (A:L) but not confidentiality or integrity. The CVSS 3.1 base score is 4.3, reflecting medium severity. No public exploits or patches are currently available. The vulnerability primarily threatens embedded systems and IoT devices using STMicroelectronics' X-CUBE-AZRTOS-WL middleware, which is common in industrial, automotive, and consumer electronics sectors. Attackers could disrupt device availability remotely, potentially impacting critical infrastructure or services relying on these devices.
Potential Impact
For European organizations, the primary impact is a potential denial of service on embedded or IoT devices running the vulnerable STMicroelectronics middleware. This could disrupt industrial automation systems, automotive control units, or smart devices, leading to operational downtime or degraded service availability. Critical sectors such as manufacturing, automotive, energy, and smart city infrastructure could face interruptions if these devices are exposed to untrusted networks. Although the vulnerability does not compromise data confidentiality or integrity, loss of availability in critical embedded systems can have cascading effects on production lines, safety systems, or service delivery. The medium CVSS score indicates moderate risk, but the actual impact depends on device deployment scale and network exposure. European organizations with extensive use of STMicroelectronics components in their supply chain or operational technology environments should prioritize risk assessments and monitoring.
Mitigation Recommendations
1. Implement strict network segmentation and access controls to isolate vulnerable embedded devices from untrusted networks, reducing exposure to malicious packets. 2. Restrict network access to the HTTP server interface of devices running X-CUBE-AZRTOS-WL to trusted management networks only. 3. Monitor network traffic for anomalous PUT requests or malformed packets targeting the HTTP server. 4. Engage with STMicroelectronics for updates and apply patches or firmware updates as soon as they become available. 5. Where possible, disable or limit HTTP server functionality on embedded devices if not required. 6. Conduct thorough inventory and asset management to identify devices using the affected middleware version 1.0.0. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of integer underflow vulnerabilities in embedded HTTP servers. 8. Develop incident response plans specific to embedded device DoS scenarios to minimize operational impact.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2024-50597: CWE-191: Integer Underflow (Wrap or Wraparound) in STMicroelectronics X-CUBE-AZRT-H7RS
Description
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
AI-Powered Analysis
Technical Analysis
CVE-2024-50597 identifies an integer underflow vulnerability categorized under CWE-191 in the HTTP server PUT request functionality of STMicroelectronics' X-CUBE-AZRTOS-WL 2.0.0 middleware package. The flaw resides in the NetX Duo component's HTTP server implementation, specifically in the source file nxd_http_server.c. When processing a PUT request, the code improperly handles integer values, allowing a crafted network packet to cause an underflow condition. This underflow can lead to memory corruption or logic errors that result in denial of service by crashing or halting the HTTP server process. The vulnerability requires only network access and low privileges (PR:L), with no user interaction needed. The scope is unchanged (S:U), and the impact affects availability (A:L) but not confidentiality or integrity. The CVSS 3.1 base score is 4.3, reflecting medium severity. No public exploits or patches are currently available. The vulnerability primarily threatens embedded systems and IoT devices using STMicroelectronics' X-CUBE-AZRTOS-WL middleware, which is common in industrial, automotive, and consumer electronics sectors. Attackers could disrupt device availability remotely, potentially impacting critical infrastructure or services relying on these devices.
Potential Impact
For European organizations, the primary impact is a potential denial of service on embedded or IoT devices running the vulnerable STMicroelectronics middleware. This could disrupt industrial automation systems, automotive control units, or smart devices, leading to operational downtime or degraded service availability. Critical sectors such as manufacturing, automotive, energy, and smart city infrastructure could face interruptions if these devices are exposed to untrusted networks. Although the vulnerability does not compromise data confidentiality or integrity, loss of availability in critical embedded systems can have cascading effects on production lines, safety systems, or service delivery. The medium CVSS score indicates moderate risk, but the actual impact depends on device deployment scale and network exposure. European organizations with extensive use of STMicroelectronics components in their supply chain or operational technology environments should prioritize risk assessments and monitoring.
Mitigation Recommendations
1. Implement strict network segmentation and access controls to isolate vulnerable embedded devices from untrusted networks, reducing exposure to malicious packets. 2. Restrict network access to the HTTP server interface of devices running X-CUBE-AZRTOS-WL to trusted management networks only. 3. Monitor network traffic for anomalous PUT requests or malformed packets targeting the HTTP server. 4. Engage with STMicroelectronics for updates and apply patches or firmware updates as soon as they become available. 5. Where possible, disable or limit HTTP server functionality on embedded devices if not required. 6. Conduct thorough inventory and asset management to identify devices using the affected middleware version 1.0.0. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of integer underflow vulnerabilities in embedded HTTP servers. 8. Develop incident response plans specific to embedded device DoS scenarios to minimize operational impact.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-10-25T19:20:52.221Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690908537fff0e30cee23900
Added to database: 11/3/2025, 7:53:55 PM
Last enriched: 11/3/2025, 8:00:26 PM
Last updated: 12/20/2025, 2:27:34 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CriticalCVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.