First published: Wed Apr 02 2025(Updated: )
An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted series of network requests can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\Middlewares\ST\netxduo\addons\http\nxd_http_server.c
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
STMicroelectronics X-CUBE-AZRTOS-WL | ||
STMicroelectronics NetX Duo Component |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50595 has been classified as a high severity vulnerability due to its potential to lead to denial of service.
To fix CVE-2024-50595, update STMicroelectronics X-CUBE-AZRTOS-WL and NetX Duo Component to their latest versions that address this vulnerability.
CVE-2024-50595 affects devices running STMicroelectronics X-CUBE-AZRTOS-WL and the NetX Duo Component.
An attacker can trigger a denial of service condition by sending a specially crafted series of network requests to exploit CVE-2024-50595.
While a patch is recommended for CVE-2024-50595, limiting direct access to the affected HTTP server can serve as a temporary workaround.