CVE-2024-38658

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Fuji Electric V-Server and V-Server Lite SCADA software allows attackers to disclose sensitive information or execute arbitrary code by tricking users into opening malicious files. This affects all versions up to and including 4.0.19.0. Industrial control system operators using these products are at risk.

💻 Affected Systems

Products:
  • V-Server
  • V-Server Lite
Versions: 4.0.19.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both full V-Server and V-Server Lite editions. Requires user interaction to open malicious files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to industrial process disruption, data theft, or ransomware deployment on SCADA networks.

🟠

Likely Case

Information disclosure of sensitive SCADA configuration data and potential limited code execution in user context.

🟢

If Mitigated

No impact if systems are properly segmented and users don't open untrusted files.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, typically not directly internet-exposed.
🏢 Internal Only: MEDIUM - Significant risk if users can be tricked into opening malicious files via phishing or network shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to deliver malicious file. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than 4.0.19.0

Vendor Advisory: https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php

Restart Required: Yes

Instructions:

1. Download latest version from Fuji Electric website. 2. Backup configurations. 3. Install update. 4. Restart system. 5. Verify version is >4.0.19.0.

🔧 Temporary Workarounds

Restrict file execution

windows

Block execution of untrusted files via application whitelisting

Configure Windows AppLocker or similar to restrict V-Server file types

User training

all

Train users not to open untrusted files with V-Server

🧯 If You Can't Patch

  • Network segmentation: Isolate V-Server systems from general user networks
  • Implement strict file validation: Only allow trusted, verified files to be opened

🔍 How to Verify

Check if Vulnerable:

Check Help > About in V-Server interface for version number

Check Version:

Check V-Server GUI or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Fuji Electric\V-Server

Verify Fix Applied:

Verify version is newer than 4.0.19.0 in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file opens in V-Server
  • Crash logs from V-Server process

Network Indicators:

  • Unusual file transfers to V-Server systems
  • Suspicious email attachments targeting operators

SIEM Query:

EventID=4688 AND ProcessName LIKE '%v-server%' AND CommandLine CONTAINS '.vsp' OR '.vsl'

🔗 References

📤 Share & Export