CVE-2024-11801

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fuji Electric Tellus Lite V-Simulator 5 installations by tricking users into opening malicious V8 files. The flaw exists in how the software parses V8 files, enabling out-of-bounds writes that can lead to remote code execution. Users of Fuji Electric Tellus Lite V-Simulator 5 are affected.

💻 Affected Systems

Products:
  • Fuji Electric Tellus Lite V-Simulator 5
Versions: V8 file parsing component
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the V-Simulator 5 component that parses V8 files. User interaction is required (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code with the privileges of the current user, potentially installing malware, stealing credentials, or establishing persistence on the system.

🟢

If Mitigated

Limited impact due to proper network segmentation, application sandboxing, and user privilege restrictions preventing full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability was reported through ZDI-CAN-24769 and is documented in ZDI-24-1627 advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1627/

Restart Required: No

Instructions:

Check Fuji Electric security advisories for patch availability. If patch is released, download from official vendor sources and apply following vendor instructions.

🔧 Temporary Workarounds

Restrict V8 file handling

windows

Configure system to open V8 files with alternative applications or block V8 file execution in Tellus Lite V-Simulator 5

Use Windows Group Policy or application settings to change file associations for .v8 files

User awareness training

all

Train users not to open V8 files from untrusted sources

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and internet access
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if Fuji Electric Tellus Lite V-Simulator 5 is installed and processes V8 files. Review ZDI-24-1627 advisory for specific version details.

Check Version:

Check application version through Windows Programs and Features or application About dialog

Verify Fix Applied:

Verify patch installation through vendor-provided verification methods or by testing with safe V8 files after applying vendor updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Tellus Lite V-Simulator 5
  • Failed attempts to parse V8 files
  • Application crashes when handling V8 files

Network Indicators:

  • Outbound connections from Tellus Lite process to unknown IPs
  • Unusual network traffic patterns following V8 file processing

SIEM Query:

Process Creation where Parent Process contains 'Tellus' OR Process Name contains 'V-Simulator' AND Command Line contains '.v8'

🔗 References

📤 Share & Export