PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-35250 Microsoft CVE debrief

CVE-2024-35250 is a Microsoft Windows kernel-mode driver untrusted pointer dereference vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2024-12-16. Because it is in KEV, defenders should treat it as a high-priority remediation item and follow Microsoft’s update guidance as soon as possible.

Vendor
Microsoft
Product
Windows
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2024-12-16
Original CVE updated
2024-12-16
Advisory published
2024-12-16
Advisory updated
2024-12-16

Who should care

Windows administrators, endpoint security teams, vulnerability management teams, incident responders, and organizations that rely on Microsoft Windows systems.

Technical summary

The issue is described as an untrusted pointer dereference in a Windows kernel-mode driver. CISA’s KEV entry indicates it is a known exploited vulnerability, which raises urgency even though the provided corpus does not include CVSS scoring or additional technical detail. The supplied CISA metadata also references Microsoft update guidance for CVE-2024-35250.

Defensive priority

High. CISA KEV inclusion means this vulnerability has confirmed exploitation and a remediation deadline of 2025-01-06 in the supplied timeline.

Recommended defensive actions

  • Review Microsoft’s guidance for CVE-2024-35250 and apply the recommended update or mitigation path.
  • Prioritize affected Windows assets in patching queues and verify remediation before the KEV due date of 2025-01-06.
  • Inventory Windows endpoints and servers to identify systems that need the Microsoft guidance applied.
  • If mitigations are not available for a given deployment, follow CISA’s KEV direction to discontinue use of the product until a fix can be applied.
  • Confirm remediation status in vulnerability management and endpoint management tools, and track any exceptions to closure.

Evidence notes

Evidence is limited to the supplied CISA KEV record and its metadata, which identify the vulnerability as a Microsoft Windows kernel-mode driver untrusted pointer dereference issue, mark it as known exploited, and set the KEV due date to 2025-01-06. The CISA metadata notes Microsoft update guidance and links the corresponding Microsoft vulnerability page and NVD entry, but no additional technical details were provided in the corpus.

Official resources

Publicly disclosed by 2024-12-16, the same date it was added to CISA’s Known Exploited Vulnerabilities catalog in the supplied timeline.