PatchSiren cyber security CVE debrief
CVE-2024-35250 Microsoft CVE debrief
CVE-2024-35250 is a Microsoft Windows kernel-mode driver untrusted pointer dereference vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2024-12-16. Because it is in KEV, defenders should treat it as a high-priority remediation item and follow Microsoft’s update guidance as soon as possible.
- Vendor
- Microsoft
- Product
- Windows
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2024-12-16
- Original CVE updated
- 2024-12-16
- Advisory published
- 2024-12-16
- Advisory updated
- 2024-12-16
Who should care
Windows administrators, endpoint security teams, vulnerability management teams, incident responders, and organizations that rely on Microsoft Windows systems.
Technical summary
The issue is described as an untrusted pointer dereference in a Windows kernel-mode driver. CISA’s KEV entry indicates it is a known exploited vulnerability, which raises urgency even though the provided corpus does not include CVSS scoring or additional technical detail. The supplied CISA metadata also references Microsoft update guidance for CVE-2024-35250.
Defensive priority
High. CISA KEV inclusion means this vulnerability has confirmed exploitation and a remediation deadline of 2025-01-06 in the supplied timeline.
Recommended defensive actions
- Review Microsoft’s guidance for CVE-2024-35250 and apply the recommended update or mitigation path.
- Prioritize affected Windows assets in patching queues and verify remediation before the KEV due date of 2025-01-06.
- Inventory Windows endpoints and servers to identify systems that need the Microsoft guidance applied.
- If mitigations are not available for a given deployment, follow CISA’s KEV direction to discontinue use of the product until a fix can be applied.
- Confirm remediation status in vulnerability management and endpoint management tools, and track any exceptions to closure.
Evidence notes
Evidence is limited to the supplied CISA KEV record and its metadata, which identify the vulnerability as a Microsoft Windows kernel-mode driver untrusted pointer dereference issue, mark it as known exploited, and set the KEV due date to 2025-01-06. The CISA metadata notes Microsoft update guidance and links the corresponding Microsoft vulnerability page and NVD entry, but no additional technical details were provided in the corpus.
Official resources
-
CVE-2024-35250 CVE record
CVE.org
-
CVE-2024-35250 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed by 2024-12-16, the same date it was added to CISA’s Known Exploited Vulnerabilities catalog in the supplied timeline.