Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35058: n/a

0
High
VulnerabilityCVE-2024-35058cvecve-2024-35058
Published: Tue May 21 2024 (05/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-35058 is a high-severity vulnerability in the API wait function of NASA AIT-Core version 2. 5. 2 that allows remote attackers to execute arbitrary code by supplying a crafted string. The vulnerability has a CVSS score of 7. 5, indicating significant impact on confidentiality, integrity, and availability. Exploitation requires high attack complexity and no privileges or user interaction, but the attack vector is remote and adjacent network-based. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is related to improper handling of sensitive data in transit (CWE-319). Organizations using NASA AIT-Core v2. 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:50:54 UTC

Technical Analysis

CVE-2024-35058 identifies a critical vulnerability in the API wait function of NASA AIT-Core version 2.5.2, a software component used in aerospace and space research environments. The flaw arises from improper handling of input strings within the API wait function, enabling attackers to supply crafted strings that lead to arbitrary code execution. This vulnerability is classified under CWE-319, indicating exposure of sensitive information during transmission, which suggests that the crafted input may exploit weaknesses in data handling or authentication mechanisms. The CVSS 3.1 score of 7.5 reflects a high-severity issue with an attack vector from adjacent networks (AV:A), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could fully compromise the affected system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected systems and the potential for remote code execution. The absence of patches or mitigations at this time increases the urgency for organizations to implement compensating controls. NASA AIT-Core is specialized software primarily used in aerospace and research sectors, indicating a targeted threat environment. The vulnerability's exploitation could allow attackers to gain unauthorized control over systems, potentially disrupting critical operations or exfiltrating sensitive data.

Potential Impact

The impact of CVE-2024-35058 is substantial, especially for organizations involved in aerospace, space research, and related government or commercial sectors using NASA AIT-Core v2.5.2. Successful exploitation could lead to full system compromise, including unauthorized code execution, data theft, and disruption of critical aerospace operations. The high impact on confidentiality, integrity, and availability means attackers could manipulate or destroy sensitive mission data, interfere with operational commands, or cause system outages. Given the specialized nature of the software, the threat primarily affects organizations with direct or indirect dependencies on NASA AIT-Core, including contractors and research institutions. The lack of available patches and the high complexity of the attack vector suggest that while exploitation is challenging, motivated threat actors with adjacent network access could leverage this vulnerability to gain a foothold in critical infrastructure environments. This could have cascading effects on national security, research integrity, and commercial aerospace operations.

Mitigation Recommendations

To mitigate CVE-2024-35058, organizations should immediately restrict network access to the NASA AIT-Core API wait function, limiting it to trusted and authenticated systems only. Implement strict network segmentation to isolate affected systems from broader enterprise networks and monitor network traffic for anomalous or malformed input strings targeting the API. Employ intrusion detection and prevention systems (IDS/IPS) with custom signatures designed to detect attempts to exploit this vulnerability. Conduct thorough code reviews and input validation audits on the API wait function to identify and remediate unsafe string handling practices. Where possible, deploy application-layer firewalls to filter and sanitize incoming API requests. Engage with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, maintain up-to-date backups and incident response plans tailored to aerospace and research environments to minimize operational disruption in case of compromise. Educate staff on the risks associated with this vulnerability and enforce strict access controls and logging to detect unauthorized activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c56b7ef31ef0b5631da

Added to database: 2/25/2026, 9:40:38 PM

Last enriched: 2/26/2026, 4:50:54 AM

Last updated: 2/26/2026, 9:38:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats