CVE-2024-35061: n/a
CVE-2024-35061 is a high-severity vulnerability affecting NASA AIT-Core v2. 5. 2, where unencrypted network communication allows man-in-the-middle (MitM) attacks. This vulnerability alone leads to data confidentiality, integrity, and availability risks. When combined with CVE-2024-35059, it enables unauthenticated, fully remote code execution, significantly escalating the threat. The vulnerability stems from the use of unencrypted channels (CWE-311), making interception and manipulation of data feasible. No patches are currently available, and no known exploits are reported in the wild. The CVSS score is 7. 3, reflecting high severity due to network attack vector, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Organizations using NASA AIT-Core should urgently assess exposure and implement mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-35061 is a vulnerability identified in NASA AIT-Core version 2.5.2, where the software transmits data over unencrypted network channels. This insecure communication channel allows attackers positioned on the network path to perform man-in-the-middle (MitM) attacks, intercepting and potentially altering data in transit. The vulnerability is categorized under CWE-311, indicating the lack of encryption or integrity protection in network communications. While this vulnerability alone compromises confidentiality, integrity, and availability to some extent, its criticality is amplified when chained with CVE-2024-35059, which enables unauthenticated, fully remote code execution. This chaining allows attackers to execute arbitrary code remotely without any authentication, posing a severe threat to affected systems. The CVSS v3.1 base score of 7.3 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability's presence in NASA AIT-Core, a tool likely used in aerospace and research environments, raises concerns about the security of sensitive data and operational integrity in these sectors.
Potential Impact
The impact of CVE-2024-35061 is significant for organizations using NASA AIT-Core, particularly in aerospace, research, and governmental sectors. The unencrypted communication channel exposes sensitive data to interception and manipulation, risking confidentiality breaches and data tampering. The potential for man-in-the-middle attacks can disrupt operations by altering commands or data streams, affecting system availability and integrity. When combined with CVE-2024-35059, the threat escalates to unauthenticated remote code execution, allowing attackers to gain full control over affected systems without credentials or user interaction. This could lead to unauthorized access, data exfiltration, sabotage of critical systems, and further lateral movement within networks. The absence of patches increases exposure time, making timely mitigation essential. The vulnerability could undermine trust in NASA-related software and impact international collaborations relying on secure data exchange.
Mitigation Recommendations
To mitigate CVE-2024-35061, organizations should immediately assess their deployment of NASA AIT-Core v2.5.2 and identify any network segments where unencrypted communication occurs. Implement network-level encryption such as VPNs or TLS tunnels to protect data in transit until official patches are released. Employ network segmentation and strict access controls to limit exposure of vulnerable systems to untrusted networks. Monitor network traffic for signs of MitM attacks or unusual activity indicative of exploitation attempts. If possible, disable or restrict the use of NASA AIT-Core components that rely on unencrypted channels. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, prepare incident response plans to address potential exploitation scenarios, including remote code execution chaining. Conduct security awareness training for personnel managing these systems to recognize and report suspicious network behavior.
Affected Countries
United States, Canada, United Kingdom, France, Germany, Japan, Australia, India, South Korea, Italy
CVE-2024-35061: n/a
Description
CVE-2024-35061 is a high-severity vulnerability affecting NASA AIT-Core v2. 5. 2, where unencrypted network communication allows man-in-the-middle (MitM) attacks. This vulnerability alone leads to data confidentiality, integrity, and availability risks. When combined with CVE-2024-35059, it enables unauthenticated, fully remote code execution, significantly escalating the threat. The vulnerability stems from the use of unencrypted channels (CWE-311), making interception and manipulation of data feasible. No patches are currently available, and no known exploits are reported in the wild. The CVSS score is 7. 3, reflecting high severity due to network attack vector, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Organizations using NASA AIT-Core should urgently assess exposure and implement mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-35061 is a vulnerability identified in NASA AIT-Core version 2.5.2, where the software transmits data over unencrypted network channels. This insecure communication channel allows attackers positioned on the network path to perform man-in-the-middle (MitM) attacks, intercepting and potentially altering data in transit. The vulnerability is categorized under CWE-311, indicating the lack of encryption or integrity protection in network communications. While this vulnerability alone compromises confidentiality, integrity, and availability to some extent, its criticality is amplified when chained with CVE-2024-35059, which enables unauthenticated, fully remote code execution. This chaining allows attackers to execute arbitrary code remotely without any authentication, posing a severe threat to affected systems. The CVSS v3.1 base score of 7.3 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability's presence in NASA AIT-Core, a tool likely used in aerospace and research environments, raises concerns about the security of sensitive data and operational integrity in these sectors.
Potential Impact
The impact of CVE-2024-35061 is significant for organizations using NASA AIT-Core, particularly in aerospace, research, and governmental sectors. The unencrypted communication channel exposes sensitive data to interception and manipulation, risking confidentiality breaches and data tampering. The potential for man-in-the-middle attacks can disrupt operations by altering commands or data streams, affecting system availability and integrity. When combined with CVE-2024-35059, the threat escalates to unauthenticated remote code execution, allowing attackers to gain full control over affected systems without credentials or user interaction. This could lead to unauthorized access, data exfiltration, sabotage of critical systems, and further lateral movement within networks. The absence of patches increases exposure time, making timely mitigation essential. The vulnerability could undermine trust in NASA-related software and impact international collaborations relying on secure data exchange.
Mitigation Recommendations
To mitigate CVE-2024-35061, organizations should immediately assess their deployment of NASA AIT-Core v2.5.2 and identify any network segments where unencrypted communication occurs. Implement network-level encryption such as VPNs or TLS tunnels to protect data in transit until official patches are released. Employ network segmentation and strict access controls to limit exposure of vulnerable systems to untrusted networks. Monitor network traffic for signs of MitM attacks or unusual activity indicative of exploitation attempts. If possible, disable or restrict the use of NASA AIT-Core components that rely on unencrypted channels. Coordinate with NASA or software vendors for updates or patches and apply them promptly once available. Additionally, prepare incident response plans to address potential exploitation scenarios, including remote code execution chaining. Conduct security awareness training for personnel managing these systems to recognize and report suspicious network behavior.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c56b7ef31ef0b5631e6
Added to database: 2/25/2026, 9:40:38 PM
Last enriched: 2/26/2026, 4:51:50 AM
Last updated: 2/26/2026, 9:38:21 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.