Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35410: n/a

0
Medium
VulnerabilityCVE-2024-35410cvecve-2024-35410
Published: Fri Nov 08 2024 (11/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-35410 is a heap overflow vulnerability found in the interpret function of the wac project, specifically in the /wac-asan/wa. c file. This flaw allows attackers to trigger a Denial of Service (DoS) by supplying a crafted WebAssembly (wasm) file. The vulnerability does not impact confidentiality or integrity but can cause application crashes, affecting availability. Exploitation requires local access since the attack vector is local (AV:L), no privileges are needed, and no user interaction is required. The CVSS score is 6. 2, indicating a medium severity level. There are currently no known exploits in the wild, and no patches have been linked yet. Organizations using wac or related wasm interpreters should be cautious and monitor for updates. Mitigation involves restricting wasm file sources, applying memory safety checks, and monitoring for abnormal crashes.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:54:13 UTC

Technical Analysis

CVE-2024-35410 is a heap overflow vulnerability identified in the wac project, specifically within the interpret function located in the /wac-asan/wa.c source file. The vulnerability arises due to improper handling of memory during the interpretation of WebAssembly (wasm) files, leading to a heap overflow condition (CWE-120). An attacker can exploit this by crafting a malicious wasm file that, when processed by the vulnerable interpret function, causes memory corruption resulting in a Denial of Service (DoS) condition. The flaw does not allow for code execution or data leakage but can crash the application or service relying on wac, impacting availability. The attack vector is local (AV:L), meaning the attacker must have local access to the system to supply the malicious wasm file. No privileges are required (PR:N), and no user interaction is necessary (UI:N), which simplifies exploitation in environments where local access is possible. The vulnerability was published on November 8, 2024, with a CVSS v3.1 base score of 6.2, reflecting a medium severity. No patches or fixes have been publicly linked yet, and no known exploits are currently reported in the wild. This vulnerability is particularly relevant for environments that use wac for wasm interpretation, such as development tools, testing environments, or embedded systems that process wasm files. The heap overflow could lead to application crashes, service interruptions, or potential cascading failures in dependent systems.

Potential Impact

The primary impact of CVE-2024-35410 is a Denial of Service (DoS) caused by application crashes due to heap overflow. Organizations relying on wac for wasm interpretation may experience service disruptions, affecting availability and potentially causing downtime in development or production environments. While confidentiality and integrity are not directly impacted, the availability loss can hinder operations, especially in automated pipelines or embedded systems that depend on wasm execution. The local attack vector limits remote exploitation, but insider threats or compromised local accounts could leverage this vulnerability. The absence of known exploits reduces immediate risk, but the medium severity score indicates that exploitation could disrupt critical workflows. Organizations with heavy reliance on wasm technologies or wac-based tools may face operational risks, including degraded service quality and increased incident response costs.

Mitigation Recommendations

To mitigate CVE-2024-35410, organizations should first monitor official wac project channels for patches or updates and apply them promptly once available. Until a patch is released, restrict the processing of wasm files to trusted sources only, employing strict validation and sandboxing techniques to limit exposure. Implement runtime memory safety tools such as AddressSanitizer or similar to detect and prevent heap overflows during development and testing. Limit local access to systems running wac interpreters to trusted users and enforce strong access controls and monitoring to detect suspicious activity. Consider isolating wasm processing environments using containerization or virtual machines to contain potential crashes. Regularly audit wasm file inputs and logs for anomalies that could indicate exploitation attempts. Finally, incorporate this vulnerability into incident response plans to ensure rapid detection and remediation if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c58b7ef31ef0b5632ea

Added to database: 2/25/2026, 9:40:40 PM

Last enriched: 2/26/2026, 4:54:13 AM

Last updated: 2/26/2026, 5:38:33 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats