CVE-2024-9852

7.8 HIGH

📋 TL;DR

This vulnerability allows a local authenticated attacker to execute malicious code by placing a specially crafted DLL in a specific folder. It affects multiple Mitsubishi Electric industrial control software products and could lead to data theft, tampering, destruction, or denial of service.

💻 Affected Systems

Products:
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric MC Works64
  • Mitsubishi Electric GENESIS32
  • Mitsubishi Electric Iconics Digital Solutions GENESIS32
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all versions of listed products. Requires Windows OS and local authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data exfiltration, manipulation of industrial processes, permanent data destruction, or sustained denial of service affecting critical operations.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive industrial control data and potential disruption of monitoring/control functions.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized local access and DLL placement.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Local authenticated attackers (including compromised accounts) can exploit this to gain elevated privileges and disrupt industrial operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and ability to place DLL in specific folder. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See vendor advisory for specific product updates

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific product updates. 2. Apply security updates provided by Mitsubishi Electric. 3. Restart affected systems after patching. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict DLL loading from untrusted locations

windows

Configure Windows DLL search order to prevent loading from current directory or untrusted paths

Set CWDIllegalInDllSearch registry value to 0xFFFFFFFF (Windows 7/2008R2+)
Use SetDefaultDllDirectories API in applications

Implement strict file permissions

windows

Restrict write permissions to application folders to prevent DLL placement

icacls "C:\Program Files\Mitsubishi\*" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\Mitsubishi\*" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit local authenticated users who can access affected systems
  • Monitor for suspicious DLL files in application directories and unauthorized file creation events

🔍 How to Verify

Check if Vulnerable:

Check if affected Mitsubishi software is installed and running without security updates. Review vendor advisory for specific version checks.

Check Version:

Check software version through Control Panel > Programs and Features or vendor-specific management tools

Verify Fix Applied:

Verify security updates are installed via Windows Update history or software version checks. Confirm DLL search path restrictions are in place.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • File creation events in application directories for DLL files
  • Process creation from unexpected locations

Network Indicators:

  • Unusual outbound connections from industrial control software
  • Anomalous authentication patterns to affected systems

SIEM Query:

EventID=4688 AND (NewProcessName contains "GENESIS" OR NewProcessName contains "ICONICS") AND CommandLine contains ".dll"

🔗 References

📤 Share & Export