Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35056: n/a

0
Critical
VulnerabilityCVE-2024-35056cvecve-2024-35056
Published: Tue May 21 2024 (05/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-35056 is a critical SQL injection vulnerability found in NASA AIT-Core version 2. 5. 2, specifically affecting the query_packets and insert functions. This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to full compromise of the affected system. The CVSS score of 9. 8 reflects its high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the vulnerability poses a severe risk to organizations using this software. Mitigation requires immediate code review and patching to sanitize inputs in the vulnerable functions. Given the specialized nature of NASA AIT-Core, organizations in aerospace, research, and government sectors worldwide are most at risk. The vulnerability is classified as critical due to its ease of exploitation and broad impact.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:50:19 UTC

Technical Analysis

CVE-2024-35056 identifies multiple SQL injection vulnerabilities in NASA AIT-Core version 2.5.2, specifically within the query_packets and insert functions. SQL injection (CWE-89) is a well-known attack vector where untrusted input is improperly sanitized, allowing attackers to manipulate backend SQL queries. This can lead to unauthorized data access, data modification, or complete system compromise. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly dangerous. The CVSS 3.1 base score of 9.8 indicates critical severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can extract sensitive data, alter or delete data, and disrupt system operations. Although no patches or exploits are currently documented, the lack of input validation in these core functions demands urgent remediation. NASA AIT-Core is used primarily in aerospace and research environments, which often handle sensitive and mission-critical data, increasing the stakes of exploitation. The vulnerability was reserved on May 9, 2024, and published on May 21, 2024, indicating recent discovery and disclosure.

Potential Impact

The potential impact of CVE-2024-35056 is severe for organizations using NASA AIT-Core v2.5.2, especially those in aerospace, government, and research sectors. Exploitation can lead to unauthorized disclosure of sensitive information, including proprietary research data or mission-critical operational details. Attackers could modify or delete critical data, disrupting workflows and potentially causing mission failures or safety risks. The ability to execute arbitrary SQL commands remotely without authentication increases the likelihood of widespread exploitation if the vulnerability is weaponized. This could also lead to lateral movement within networks, further compromising organizational infrastructure. The unavailability of patches at the time of disclosure means organizations remain exposed, increasing the urgency for interim protective measures. The critical severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to affected entities worldwide.

Mitigation Recommendations

Organizations should immediately conduct a thorough code audit of the query_packets and insert functions within NASA AIT-Core to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to ensure proper input sanitization and prevent injection. Until official patches are released, restrict network access to the affected systems using firewall rules or network segmentation to limit exposure. Monitor logs for unusual database query patterns that may indicate exploitation attempts. Employ Web Application Firewalls (WAFs) or database activity monitoring tools capable of detecting and blocking SQL injection attempts. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, conduct regular backups and verify recovery procedures to mitigate potential data loss. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c56b7ef31ef0b5631d2

Added to database: 2/25/2026, 9:40:38 PM

Last enriched: 2/26/2026, 4:50:19 AM

Last updated: 2/26/2026, 8:04:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats