Local Authenticated Attacker Can Execute Malicious Code in ICONICS GENESIS64
CVE-2024-8299
7.8HIGH
Key Information:
- Status
- Vendor
- CVE Published:
- 28 November 2024
Summary
The vulnerability allows an authenticated local attacker to execute arbitrary code by placing a specially crafted DLL in a designated folder, potentially leading to data disclosure, modification, destruction, or denial of service within the affected products. The instances involve both ICONICS and Mitsubishi Electric's GENESIS64 and MC Works64 platforms, emphasizing the necessity for review and remediation to secure systems against exploitation.
Affected Version(s)
GENESIS64 all versions
GENESIS64 all versions
MC Works64 all versions
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Asher Davila of Palo Alto Networks
Malav Vyas of Palo Alto Networks