CVE-2024-38309

7.8 HIGH

📋 TL;DR

Multiple stack-based buffer overflow vulnerabilities in Fuji Electric's V-SFT, TELLUS, and TELLUS Lite software allow attackers to execute arbitrary code or disclose information when users open malicious files. This affects all users running vulnerable versions of these industrial control system software products.

💻 Affected Systems

Products:
  • V-SFT
  • TELLUS
  • TELLUS Lite
Versions: V-SFT v6.2.2.0 and earlier, TELLUS v4.0.19.0 and earlier, TELLUS Lite v4.0.19.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: These are industrial control system software products used for monitoring and control in manufacturing/industrial environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to industrial process disruption, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to industrial control systems and potential manipulation of operational parameters.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege access controls are implemented.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of file format specifics.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V-SFT v6.2.3.0 or later, TELLUS v4.0.20.0 or later, TELLUS Lite v4.0.20.0 or later

Vendor Advisory: https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php

Restart Required: Yes

Instructions:

1. Download updated software from Fuji Electric's website. 2. Backup configuration files. 3. Uninstall vulnerable version. 4. Install patched version. 5. Restore configuration files. 6. Restart system.

🔧 Temporary Workarounds

Restrict File Access

all

Implement strict file access controls to prevent opening untrusted files

Application Whitelisting

windows

Configure Windows AppLocker or similar to restrict execution to trusted applications only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Enforce least privilege access controls and disable unnecessary file sharing services

🔍 How to Verify

Check if Vulnerable:

Check software version in Help > About menu or program properties

Check Version:

Check application properties or Help > About menu in the software interface

Verify Fix Applied:

Verify installed version is equal to or greater than patched versions listed above

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Suspicious file access patterns
  • Unusual process creation from TELLUS/V-SFT processes

Network Indicators:

  • Unusual outbound connections from industrial control systems
  • File transfer activity to/from TELLUS/V-SFT systems

SIEM Query:

source="windows" AND (process_name="*TELLUS*" OR process_name="*V-SFT*") AND (event_id=1000 OR event_id=1001)

🔗 References

📤 Share & Export