CVE-2023-5299

7.3 HIGH

📋 TL;DR

A standard user account in Fuji Electric Tellus Lite can overwrite system files due to improper access control. This affects organizations using vulnerable versions of Tellus Lite software, potentially allowing privilege escalation or system disruption.

💻 Affected Systems

Products:
  • Fuji Electric Tellus Lite
Versions: Versions prior to V8.0.1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard user accounts in Tellus Lite software installations

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could overwrite critical system files, leading to complete system compromise, denial of service, or installation of persistent malware.

🟠

Likely Case

Standard users could gain unauthorized privileges, modify application configurations, or disrupt normal operations.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to isolated file modifications with minimal system-wide effects.

🌐 Internet-Facing: LOW (This is industrial control software typically not directly internet-facing)
🏢 Internal Only: HIGH (Internal users with standard accounts can exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires standard user credentials but exploitation is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V8.0.1.0

Vendor Advisory: https://felib.fujielectric.co.jp/en/M10009/M20034/document_detail/c27d5b69-68ef-4af5-90ee-b5dab118f71a

Restart Required: Yes

Instructions:

1. Download Tellus Lite V8.0.1.0 from Fuji Electric support portal. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system.

🔧 Temporary Workarounds

Restrict user permissions

windows

Apply strict file system permissions to limit standard user write access to system directories

icacls "C:\Program Files\Tellus Lite" /deny "Domain\Users":(OI)(CI)W

Implement application whitelisting

windows

Use Windows AppLocker or similar to restrict which applications standard users can execute

🧯 If You Can't Patch

  • Implement least privilege access controls and regularly audit user permissions
  • Monitor file system changes in Tellus Lite directories and alert on unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check Tellus Lite version in Help > About menu or examine installed programs in Windows Control Panel

Check Version:

wmic product where "name like '%Tellus Lite%'" get version

Verify Fix Applied:

Confirm version is V8.0.1.0 or later and test that standard users cannot write to system directories

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event Logs showing file write operations by standard users in system directories
  • Tellus Lite application logs showing unexpected file modifications

Network Indicators:

  • Unusual network connections from Tellus Lite system following file modifications

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Tellus Lite%' AND SubjectUserName NOT IN ('Administrator', 'SYSTEM')

🔗 References

📤 Share & Export