CVE-2024-8299

7.8 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and related industrial control software. A local authenticated attacker can place a malicious DLL in a specific folder to execute arbitrary code, potentially leading to data theft, manipulation, or denial of service. All versions of the affected products are vulnerable.

💻 Affected Systems

Products:
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric MC Works64
  • Mitsubishi Electric GENESIS32
  • Mitsubishi Electric Iconics Digital Solutions GENESIS32
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This affects industrial control systems (ICS/SCADA) used in critical infrastructure. The vulnerability requires local authenticated access to the system running the software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the industrial control system, allowing data exfiltration, manipulation of critical processes, permanent system destruction, or sustained denial of service affecting industrial operations.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive industrial data, configuration tampering, or temporary service disruption.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized local access to the vulnerable folder and application directories.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any authenticated user on the system can potentially exploit this vulnerability to gain elevated privileges and compromise the industrial control software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the specific folder path where DLLs are loaded. The attacker needs to place a malicious DLL with the correct name in that folder.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Mitsubishi Electric for specific patch information

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf

Restart Required: Yes

Instructions:

1. Contact Mitsubishi Electric for security patches
2. Apply patches according to vendor instructions
3. Restart affected systems after patching
4. Verify patch installation

🔧 Temporary Workarounds

Restrict folder permissions

windows

Set strict access controls on the specific folder where DLLs are loaded to prevent unauthorized writes

icacls "C:\path\to\vulnerable\folder" /deny Users:(OI)(CI)W
icacls "C:\path\to\vulnerable\folder" /grant Administrators:F

Enable Windows Defender Application Control

windows

Implement application whitelisting to prevent execution of unauthorized DLLs

🧯 If You Can't Patch

  • Implement strict access controls to limit local authenticated users who can access the system
  • Monitor for unauthorized DLL files in application directories and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check if you have any of the affected Mitsubishi Electric industrial control software installed and verify version information

Check Version:

Check software version through the application interface or Windows Programs and Features

Verify Fix Applied:

Contact Mitsubishi Electric to confirm patch application and verify folder permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading events in Windows Event Logs
  • Unauthorized file creation in application directories
  • Process execution from unusual locations

Network Indicators:

  • Unusual outbound connections from industrial control systems
  • Anomalous authentication patterns to ICS systems

SIEM Query:

source="Windows Security" EventCode=4688 OR EventCode=4663 | where ProcessName contains "GENESIS" OR ProcessName contains "ICONICS" | where FilePath contains ".dll"

🔗 References

📤 Share & Export