CVE-2024-1574

6.7 MEDIUM

📋 TL;DR

This vulnerability allows a local attacker to execute arbitrary code with administrative privileges by tampering with an unprotected file in Mitsubishi Electric's GENESIS64, GENESIS32, ICONICS Suite, BizViz, and MC Works64 software. The unsafe reflection flaw enables attackers to load and execute malicious code through the licensing feature. Affected organizations include industrial control system operators using these supervisory control and data acquisition (SCADA) products.

💻 Affected Systems

Products:
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions GENESIS32
  • Mitsubishi Electric GENESIS32
  • Mitsubishi Electric Iconics Digital Solutions BizViz
  • Mitsubishi Electric BizViz
  • Mitsubishi Electric MC Works64
Versions: GENESIS64: 10.97 to 10.97.2; GENESIS32: 9.7 and prior; ICONICS Suite: 10.97 to 10.97.2; BizViz: 9.7 and prior; MC Works64: all versions
Operating Systems: Windows (typically used for SCADA systems)
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. The vulnerability requires local access to the system where these applications are installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges leading to disruption of industrial processes, data theft, or ransomware deployment on critical infrastructure systems.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative control over the SCADA system, potentially enabling further lateral movement within industrial networks.

🟢

If Mitigated

Limited impact if proper access controls and file integrity monitoring are implemented, though the vulnerability still exists in the software.

🌐 Internet-Facing: LOW - Requires local access to the system, though internet-facing systems could be targeted if attackers gain initial access through other means.
🏢 Internal Only: HIGH - Industrial control systems are typically internal networks, and local attackers (including malicious insiders or compromised accounts) can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to tamper with a specific file. The vulnerability details are publicly disclosed but no proof-of-concept exploit has been published as of the advisory dates.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GENESIS64/ICONICS Suite: Update to version 10.97.3 or later; GENESIS32/BizViz: Update to version 9.8 or later; MC Works64: Update to version 4.0.500 or later

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Mitsubishi Electric's official website. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system as required. 5. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Restrict file permissions

windows

Apply strict access controls to the vulnerable licensing file to prevent unauthorized modifications.

icacls "C:\Path\To\Vulnerable\File" /deny Everyone:(F,M,WDAC,WEA,DC,DE,RC,RA,REA,X,WA)

Implement application whitelisting

windows

Use Windows Defender Application Control or similar solutions to prevent execution of unauthorized code.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges on SCADA systems.
  • Deploy file integrity monitoring to detect unauthorized modifications to system files.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of GENESIS64, GENESIS32, ICONICS Suite, BizViz, or MC Works64 against the affected version ranges listed in the advisory.

Check Version:

Check the version through the application's About dialog or installed programs list in Windows Control Panel.

Verify Fix Applied:

Verify the software version has been updated to the patched versions: GENESIS64/ICONICS Suite ≥10.97.3, GENESIS32/BizViz ≥9.8, MC Works64 ≥4.0.500.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file modifications to licensing-related files
  • Unexpected process execution with administrative privileges
  • Security event logs showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from SCADA systems
  • Anomalous authentication patterns to administrative accounts

SIEM Query:

EventID=4688 AND (NewProcessName LIKE '%powershell%' OR NewProcessName LIKE '%cmd%') AND SubjectUserName NOT IN (authorized_users) AND ParentProcessName LIKE '%GENESIS%'

🔗 References

📤 Share & Export