CVE-2023-47582
📋 TL;DR
This vulnerability in TELLUS and TELLUS Lite software allows attackers to execute arbitrary code or disclose sensitive information by tricking a user into opening a malicious file. It affects users of TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0, potentially leading to system compromise.
💻 Affected Systems
- TELLUS
- TELLUS Lite
📦 What is this software?
Tellus by Fujielectric
Tellus Lite by Fujielectric
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via arbitrary code execution, leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Information disclosure or limited code execution due to user interaction required, potentially resulting in data loss or malware infection.
If Mitigated
Minimal impact if users avoid opening untrusted files and systems are isolated, though risk persists if software is used.
🎯 Exploit Status
Exploitation requires user interaction to open a crafted file; no public proof-of-concept is known, but the vulnerability is documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after V4.0.17.0
Vendor Advisory: https://hakko-elec.co.jp/site/download/03tellus_inf/index.php
Restart Required: Yes
Instructions:
1. Download the latest version from the vendor advisory URL. 2. Install the update following vendor instructions. 3. Restart the system to apply changes.
🔧 Temporary Workarounds
Restrict File Access
allBlock users from opening X1, V8, or V9 files from untrusted sources to prevent exploitation.
User Training
allEducate users to avoid opening suspicious files and verify sources before opening TELLUS-related files.
🧯 If You Can't Patch
- Isolate affected systems from critical networks to limit potential lateral movement.
- Implement application whitelisting to block execution of unauthorized code.
🔍 How to Verify
Check if Vulnerable:
Check the software version in TELLUS or TELLUS Lite; if it is V4.0.17.0 or earlier, it is vulnerable.
Check Version:
Check the 'About' or version info within the TELLUS software interface.
Verify Fix Applied:
After updating, confirm the version is higher than V4.0.17.0 and test opening safe X1, V8, or V9 files to ensure stability.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file access logs for X1, V8, or V9 files
- Process crashes or abnormal behavior in TELLUS software
Network Indicators:
- Unusual outbound connections from TELLUS systems post-file opening
SIEM Query:
Search for events where TELLUS.exe accesses X1, V8, or V9 files followed by new process creation or network activity.
🔗 References
- https://hakko-elec.co.jp/site/download/03tellus_inf/index.php
- https://jvn.jp/en/vu/JVNVU93840158/
- https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php
- https://hakko-elec.co.jp/site/download/03tellus_inf/index.php
- https://jvn.jp/en/vu/JVNVU93840158/
- https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php