CVE-2024-11799

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Fuji Electric Tellus Lite V-Simulator 5 allows remote attackers to execute arbitrary code when users open malicious V8 files. This affects installations of Fuji Electric Tellus Lite where the V-Simulator 5 component processes untrusted V8 files. Attackers can achieve remote code execution in the context of the current process.

💻 Affected Systems

Products:
  • Fuji Electric Tellus Lite V-Simulator 5
Versions: V8 file parsing component (specific version details not provided in advisory)
Operating Systems: Windows (assumed based on typical industrial software deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious V8 files. The vulnerability exists in the V-Simulator 5 component of Tellus Lite software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal sensitive data, or use the compromised system as a foothold for further attacks.

🟢

If Mitigated

Limited impact due to proper network segmentation, application whitelisting, and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file). The vulnerability is well-documented with CWE-121 classification, making exploitation relatively straightforward for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1625/

Restart Required: Yes

Instructions:

1. Contact Fuji Electric for patch availability
2. Apply the official patch from Fuji Electric
3. Restart affected systems
4. Verify patch installation

🔧 Temporary Workarounds

Restrict V8 file execution

windows

Block execution of V8 files from untrusted sources using application control policies

User awareness training

all

Train users to avoid opening V8 files from unknown or untrusted sources

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems from critical infrastructure
  • Deploy application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if Fuji Electric Tellus Lite V-Simulator 5 is installed and processes V8 files. Review software version against vendor advisory.

Check Version:

Check software version through Fuji Electric Tellus Lite interface or Windows Programs and Features

Verify Fix Applied:

Verify patch installation through vendor-provided verification methods or version checks. Test with safe V8 files to ensure proper parsing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Tellus Lite executable
  • Multiple failed V8 file parsing attempts
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections from Tellus Lite process
  • File transfers to/from Tellus Lite systems

SIEM Query:

Process creation where parent_process contains 'Tellus' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe')

🔗 References

📤 Share & Export