Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35061: n/a

0
High
VulnerabilityCVE-2024-35061cvecve-2024-35061
Published: Tue May 21 2024 (05/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-35061 is a high-severity vulnerability affecting NASA AIT-Core v2. 5. 2, where unencrypted network communication allows man-in-the-middle (MitM) attacks. This vulnerability alone leads to data confidentiality, integrity, and availability risks. When combined with CVE-2024-35059, it enables unauthenticated, fully remote code execution, significantly escalating the threat. The vulnerability stems from the use of unencrypted channels (CWE-311), making interception and manipulation of data feasible. No patches are currently available, and no known exploits are reported in the wild. The CVSS score is 7. 3, reflecting high severity due to network attack vector, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Organizations using NASA AIT-Core should urgently assess exposure and implement mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:51:50 UTC

Technical Analysis

CVE-2024-35061 is a vulnerability identified in NASA AIT-Core version 2.5.2, where the software transmits data over unencrypted network channels. This insecure communication channel allows attackers positioned on the network path to perform man-in-the-middle (MitM) attacks, intercepting and potentially altering data in transit. The vulnerability is categorized under CWE-311, indicating the lack of encryption or integrity protection in network communications. While this vulnerability alone compromises confidentiality, integrity, and availability to some extent, its criticality is amplified when chained with CVE-2024-35059, which enables unauthenticated, fully remote code execution. This chaining allows attackers to execute arbitrary code remotely without any authentication, posing a severe threat to affected systems. The CVSS v3.1 base score of 7.3 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability's presence in NASA AIT-Core, a tool likely used in aerospace and research environments, raises concerns about the security of sensitive data and operational integrity in these sectors.

Potential Impact

The impact of CVE-2024-35061 is significant for organizations using NASA AIT-Core, particularly in aerospace, research, and governmental sectors. The unencrypted communication channel exposes sensitive data to interception and manipulation, risking confidentiality breaches and data tampering. The potential for man-in-the-middle attacks can disrupt operations by altering commands or data streams, affecting system availability and integrity. When combined with CVE-2024-35059, the threat escalates to unauthenticated remote code execution, allowing attackers to gain full control over affected systems without credentials or user interaction. This could lead to unauthorized access, data exfiltration, sabotage of critical systems, and further lateral movement within networks. The absence of patches increases exposure time, making timely mitigation essential. The vulnerability could undermine trust in NASA-related software and impact international collaborations relying on secure data exchange.

Mitigation Recommendations

To mitigate CVE-2024-35061, organizations should immediately assess their deployment of NASA AIT-Core v2.5.2 and identify any network segments where unencrypted communication occurs. Implement network-level encryption such as VPNs or TLS tunnels to protect data in transit until official patches are released. Employ network segmentation and strict access controls to limit exposure of vulnerable systems to untrusted networks. Monitor network traffic for signs of MitM attacks or unusual activity indicative of exploitation attempts. If possible, disable or restrict the use of NASA AIT-Core components that rely on unencrypted channels. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, prepare incident response plans to address potential exploitation scenarios, including remote code execution chaining. Conduct security awareness training for personnel managing these systems to recognize and report suspicious network behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c56b7ef31ef0b5631e6

Added to database: 2/25/2026, 9:40:38 PM

Last enriched: 2/26/2026, 4:51:50 AM

Last updated: 2/26/2026, 9:38:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats