CVE-2024-1182

7.0 HIGH

📋 TL;DR

This is a DLL hijacking vulnerability in Mitsubishi Electric's GENESIS and ICONICS industrial control software suites. A local attacker can execute arbitrary code by placing a malicious DLL in a specific folder when the Pager agent is installed. This affects all versions of GENESIS64, GENESIS32, ICONICS Suite, and MC Works64 software.

💻 Affected Systems

Products:
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions GENESIS32
  • Mitsubishi Electric GENESIS32
  • Mitsubishi Electric MC Works64
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability only exists when Pager agent is installed as part of the alarm multi-agent notification feature.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM-level privileges, allowing installation of persistent malware, data theft, or disruption of industrial operations.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to industrial control systems, potential data exfiltration, or lateral movement within OT networks.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized local access to affected systems.

🌐 Internet-Facing: LOW - Exploitation requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Industrial control systems are typically internal networks where local access could be obtained by insiders or through lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and knowledge of the specific folder path where DLLs are loaded from.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not version-specific - requires configuration changes

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf

Restart Required: Yes

Instructions:

1. Uninstall the Pager agent from affected systems. 2. Restart the system. 3. Verify Pager agent is no longer present in installed programs.

🔧 Temporary Workarounds

Remove Pager Agent

windows

Uninstall the Pager agent component which is required for exploitation

Control Panel > Programs and Features > Uninstall Pager Agent

Restrict Folder Permissions

windows

Apply strict access controls to the folder where malicious DLLs could be placed

icacls "C:\Program Files\ICONICS\GENESIS64\Bin" /deny Everyone:(OI)(CI)F

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected systems.
  • Monitor for suspicious DLL files in the application installation directories.

🔍 How to Verify

Check if Vulnerable:

Check if Pager agent is installed: Control Panel > Programs and Features, look for 'Pager' or related ICONICS components.

Check Version:

Not applicable - all versions are affected

Verify Fix Applied:

Verify Pager agent is no longer listed in installed programs and cannot be found in the system.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from application directories
  • Failed attempts to access restricted folders
  • Pager agent installation/removal events

Network Indicators:

  • Unusual outbound connections from industrial control systems

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%GENESIS%' OR ProcessName LIKE '%ICONICS%') AND CommandLine LIKE '%.dll%'

🔗 References

📤 Share & Export