Uncontrolled Search Path Element Vulnerability in ICONICS GENESIS64
CVE-2024-9852
7.8HIGH
Key Information:
- Status
- Vendor
- CVE Published:
- 28 November 2024
Summary
The uncontrolled search path element vulnerability in the ICONICS GENESIS64 and Mitsubishi Electric product lines allows a local authenticated attacker to exploit the system by placing a specially crafted DLL into a designated folder. This exploitation can lead to unauthorized execution of malicious code, potentially allowing the attacker to disclose sensitive information, tamper with data, or disrupt operations, resulting in denial of service (DoS) conditions. Organizations utilizing these products should take immediate steps to assess their security posture and mitigate the risks associated with this vulnerability.
Affected Version(s)
GENESIS64 all versions
GENESIS64 all versions
MC Works64 all versions
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Asher Davila of Palo Alto Networks
Malav Vyas of Palo Alto Networks