CVE-2024-11803

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fuji Electric Tellus Lite V-Simulator 5 installations by tricking users into opening malicious V8 files. The flaw exists in improper bounds checking during V8 file parsing, enabling out-of-bounds writes that can lead to remote code execution. Affected users include anyone running vulnerable versions of the Tellus Lite V-Simulator 5 software.

💻 Affected Systems

Products:
  • Fuji Electric Tellus Lite V-Simulator 5
Versions: V8 file parsing component (specific version details not provided in advisory)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious V8 file or visit malicious page that triggers file parsing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code with the privileges of the current user, potentially installing malware, stealing credentials, or establishing persistence on the system.

🟢

If Mitigated

Limited impact due to proper network segmentation, application whitelisting, and user training preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious V8 file, but technical exploitation is straightforward once file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1629/

Restart Required: Yes

Instructions:

1. Contact Fuji Electric for patch availability 2. Apply vendor-provided security update 3. Restart affected systems 4. Verify patch installation

🔧 Temporary Workarounds

Restrict V8 file execution

windows

Block execution of V8 files through application control policies

Windows: Use AppLocker or Software Restriction Policies to block .v8 files

User training and awareness

all

Educate users about risks of opening untrusted V8 files

🧯 If You Can't Patch

  • Implement network segmentation to isolate Tellus Lite systems
  • Use application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if Tellus Lite V-Simulator 5 is installed and review version against vendor advisory

Check Version:

Check application properties or vendor documentation for version information

Verify Fix Applied:

Verify patch installation through vendor update verification tools or version checking

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Tellus Lite
  • Multiple failed file parsing attempts
  • Unexpected network connections from Tellus Lite process

Network Indicators:

  • Outbound connections to suspicious IPs after V8 file processing
  • Unusual traffic patterns from Tellus Lite systems

SIEM Query:

Process creation where parent process contains 'Tellus' AND (command line contains '.v8' OR file extension is '.v8')

🔗 References

📤 Share & Export