CVE-2024-11803
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Fuji Electric Tellus Lite V-Simulator 5 installations by tricking users into opening malicious V8 files. The flaw exists in improper bounds checking during V8 file parsing, enabling out-of-bounds writes that can lead to remote code execution. Affected users include anyone running vulnerable versions of the Tellus Lite V-Simulator 5 software.
💻 Affected Systems
- Fuji Electric Tellus Lite V-Simulator 5
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Attacker executes malicious code with the privileges of the current user, potentially installing malware, stealing credentials, or establishing persistence on the system.
If Mitigated
Limited impact due to proper network segmentation, application whitelisting, and user training preventing malicious file execution.
🎯 Exploit Status
Exploitation requires social engineering to deliver malicious V8 file, but technical exploitation is straightforward once file is opened.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1629/
Restart Required: Yes
Instructions:
1. Contact Fuji Electric for patch availability 2. Apply vendor-provided security update 3. Restart affected systems 4. Verify patch installation
🔧 Temporary Workarounds
Restrict V8 file execution
windowsBlock execution of V8 files through application control policies
Windows: Use AppLocker or Software Restriction Policies to block .v8 files
User training and awareness
allEducate users about risks of opening untrusted V8 files
🧯 If You Can't Patch
- Implement network segmentation to isolate Tellus Lite systems
- Use application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check if Tellus Lite V-Simulator 5 is installed and review version against vendor advisory
Check Version:
Check application properties or vendor documentation for version information
Verify Fix Applied:
Verify patch installation through vendor update verification tools or version checking
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Tellus Lite
- Multiple failed file parsing attempts
- Unexpected network connections from Tellus Lite process
Network Indicators:
- Outbound connections to suspicious IPs after V8 file processing
- Unusual traffic patterns from Tellus Lite systems
SIEM Query:
Process creation where parent process contains 'Tellus' AND (command line contains '.v8' OR file extension is '.v8')