CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-35347

High Severity
SVRS
50/100

CVSSv3
NA/10

EPSS
/1

CVE-2024-35347 is a reserved CVE, indicating a potential vulnerability that is yet to be fully defined or disclosed. While the CVSS score is currently 0, reflecting the lack of detailed information, the SOCRadar Vulnerability Risk Score (SVRS) is 50, suggesting a moderate level of inherent risk. This elevated SVRS may stem from observed activity "In The Wild," even before complete vulnerability details are public. Organizations should actively monitor for updates on CVE-2024-35347. The risk is that attackers may already be attempting to exploit this weakness based on limited information, making proactive vigilance critical. Even without a full description, the "Reserved Cve" tag with "In The Wild" suggests some exploitation is possible. Keep systems patched and monitor relevant security advisories closely. Further analysis is needed when more details are released.

Reserved Cve
In The Wild
0001-01-01

0001-01-01
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-35347 is a reserved CVE entry. While lacking specific details on the vulnerability itself due to its reserved status, its presence in the "In The Wild" category and an SVRS of 50 indicates a potential cybersecurity risk, even if the exact nature of that risk is currently undefined. An SVRS of 50 suggests a moderate level of concern, potentially indicating emerging exploitation or a lack of complete understanding of the vulnerability's impact.

Key Insights

  • Reserved CVE with Active Exploitation: The "Reserved CVE" status means that details about the specific vulnerability are not yet publicly available. However, the "In The Wild" tag signifies that the vulnerability is actively exploited by hackers. This contradiction requires immediate attention and investigation as it suggests that while official information is lacking, malicious actors are already taking advantage of the flaw.
  • Moderate SVRS Despite Limited Information: The SVRS score of 50 is noteworthy considering the limited publicly available information. It implies that SOCRadar's Vulnerability Intelligence has identified potential risks associated with this CVE based on sources beyond the standard CVSS framework, such as mentions on social media, dark web activity, or code repositories. This suggests a level of real-world threat that warrants further scrutiny.
  • Lack of Specifics Creates Challenges: The absence of a detailed description makes it difficult to implement precise mitigation strategies. Organizations need to proactively monitor for indicators of compromise (IOCs) related to this CVE and be prepared to respond quickly once more information becomes available.

Mitigation Strategies

  • Proactive Monitoring and Threat Hunting: Implement continuous monitoring of network traffic, system logs, and endpoint activity for any suspicious behavior potentially related to CVE-2024-35347. Utilize threat intelligence feeds to identify potential IOCs and proactively hunt for signs of compromise.
  • Enhanced Incident Response Preparedness: Given the active exploitation and the lack of detailed information, ensure incident response plans are up-to-date and ready to be executed. This includes having processes in place to quickly identify affected systems, contain the damage, and restore services.
  • Vulnerability Scanning and Patch Management: Regularly scan systems for known vulnerabilities, prioritizing those with publicly available exploits. While specific patches may not yet be available for CVE-2024-35347, ensure that systems are patched against other known vulnerabilities that could be exploited as part of a chained attack.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability
2025-04-08
Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability | Posted by Andrew Cooper on Apr 08Oops, my mistake. (This is what happens when the sources of information try to block things like copy/paste, and I'm in a rush.) However, happy patch Tuesday. Zen5 CPUs have been breached too, and https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html has been quietly updated to reflect
seclists.org
rss
forum
news
Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability
2025-03-05
Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability | Posted by Andrew Cooper on Mar 05See: https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html Right now there are four known but (reasonably) benign microcodes from a non-AMD source. However, there is a tool to sign arbitrary microcode. In Xen, we've
seclists.org
rss
forum
news

Social Media

CVE-2024-35347: Xen Security Notice 2 AMD CPU Microcode Signature Verification Vulnerability https://t.co/JM4LfJdxG9 a stopgap mitigation to perform extra checks on microcode load on affected CPU families. This is a SHA2 digest check against hashes with believed-good provenance.
1
0
0

Affected Software

No affected software found for this CVE

References

No references found for this CVE

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence