CVE-2024-35056: n/a
CVE-2024-35056 is a critical SQL injection vulnerability found in NASA AIT-Core version 2. 5. 2, specifically affecting the query_packets and insert functions. This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to full compromise of the affected system. The CVSS score of 9. 8 reflects its high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the vulnerability poses a severe risk to organizations using this software. Mitigation requires immediate code review and patching to sanitize inputs in the vulnerable functions. Given the specialized nature of NASA AIT-Core, organizations in aerospace, research, and government sectors worldwide are most at risk. The vulnerability is classified as critical due to its ease of exploitation and broad impact.
AI Analysis
Technical Summary
CVE-2024-35056 identifies multiple SQL injection vulnerabilities in NASA AIT-Core version 2.5.2, specifically within the query_packets and insert functions. SQL injection (CWE-89) is a well-known attack vector where untrusted input is improperly sanitized, allowing attackers to manipulate backend SQL queries. This can lead to unauthorized data access, data modification, or complete system compromise. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly dangerous. The CVSS 3.1 base score of 9.8 indicates critical severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can extract sensitive data, alter or delete data, and disrupt system operations. Although no patches or exploits are currently documented, the lack of input validation in these core functions demands urgent remediation. NASA AIT-Core is used primarily in aerospace and research environments, which often handle sensitive and mission-critical data, increasing the stakes of exploitation. The vulnerability was reserved on May 9, 2024, and published on May 21, 2024, indicating recent discovery and disclosure.
Potential Impact
The potential impact of CVE-2024-35056 is severe for organizations using NASA AIT-Core v2.5.2, especially those in aerospace, government, and research sectors. Exploitation can lead to unauthorized disclosure of sensitive information, including proprietary research data or mission-critical operational details. Attackers could modify or delete critical data, disrupting workflows and potentially causing mission failures or safety risks. The ability to execute arbitrary SQL commands remotely without authentication increases the likelihood of widespread exploitation if the vulnerability is weaponized. This could also lead to lateral movement within networks, further compromising organizational infrastructure. The unavailability of patches at the time of disclosure means organizations remain exposed, increasing the urgency for interim protective measures. The critical severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to affected entities worldwide.
Mitigation Recommendations
Organizations should immediately conduct a thorough code audit of the query_packets and insert functions within NASA AIT-Core to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to ensure proper input sanitization and prevent injection. Until official patches are released, restrict network access to the affected systems using firewall rules or network segmentation to limit exposure. Monitor logs for unusual database query patterns that may indicate exploitation attempts. Employ Web Application Firewalls (WAFs) or database activity monitoring tools capable of detecting and blocking SQL injection attempts. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, conduct regular backups and verify recovery procedures to mitigate potential data loss. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, India, South Korea, Italy
CVE-2024-35056: n/a
Description
CVE-2024-35056 is a critical SQL injection vulnerability found in NASA AIT-Core version 2. 5. 2, specifically affecting the query_packets and insert functions. This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to full compromise of the affected system. The CVSS score of 9. 8 reflects its high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the vulnerability poses a severe risk to organizations using this software. Mitigation requires immediate code review and patching to sanitize inputs in the vulnerable functions. Given the specialized nature of NASA AIT-Core, organizations in aerospace, research, and government sectors worldwide are most at risk. The vulnerability is classified as critical due to its ease of exploitation and broad impact.
AI-Powered Analysis
Technical Analysis
CVE-2024-35056 identifies multiple SQL injection vulnerabilities in NASA AIT-Core version 2.5.2, specifically within the query_packets and insert functions. SQL injection (CWE-89) is a well-known attack vector where untrusted input is improperly sanitized, allowing attackers to manipulate backend SQL queries. This can lead to unauthorized data access, data modification, or complete system compromise. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly dangerous. The CVSS 3.1 base score of 9.8 indicates critical severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can extract sensitive data, alter or delete data, and disrupt system operations. Although no patches or exploits are currently documented, the lack of input validation in these core functions demands urgent remediation. NASA AIT-Core is used primarily in aerospace and research environments, which often handle sensitive and mission-critical data, increasing the stakes of exploitation. The vulnerability was reserved on May 9, 2024, and published on May 21, 2024, indicating recent discovery and disclosure.
Potential Impact
The potential impact of CVE-2024-35056 is severe for organizations using NASA AIT-Core v2.5.2, especially those in aerospace, government, and research sectors. Exploitation can lead to unauthorized disclosure of sensitive information, including proprietary research data or mission-critical operational details. Attackers could modify or delete critical data, disrupting workflows and potentially causing mission failures or safety risks. The ability to execute arbitrary SQL commands remotely without authentication increases the likelihood of widespread exploitation if the vulnerability is weaponized. This could also lead to lateral movement within networks, further compromising organizational infrastructure. The unavailability of patches at the time of disclosure means organizations remain exposed, increasing the urgency for interim protective measures. The critical severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to affected entities worldwide.
Mitigation Recommendations
Organizations should immediately conduct a thorough code audit of the query_packets and insert functions within NASA AIT-Core to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to ensure proper input sanitization and prevent injection. Until official patches are released, restrict network access to the affected systems using firewall rules or network segmentation to limit exposure. Monitor logs for unusual database query patterns that may indicate exploitation attempts. Employ Web Application Firewalls (WAFs) or database activity monitoring tools capable of detecting and blocking SQL injection attempts. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, conduct regular backups and verify recovery procedures to mitigate potential data loss. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities in future releases.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c56b7ef31ef0b5631d2
Added to database: 2/25/2026, 9:40:38 PM
Last enriched: 2/26/2026, 4:50:19 AM
Last updated: 2/26/2026, 8:04:59 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.