Critical Security Advisory: ICONICS GENESIS64 & Mitsubishi Electric Vulnerabilities

  • Thread Author
Recent advisories from the Cybersecurity and Infrastructure Security Agency (CISA) have raised alarms for users of the ICONICS GENESIS64 and Mitsubishi Electric products. With a CVSS v4 score of 8.5, the warning emphasizes a low attack complexity, making it imperative for users in critical manufacturing sectors to act swiftly in addressing these vulnerabilities before they can be exploited.

Overview of Vulnerabilities​

The vulnerabilities reported are primarily linked to Uncontrolled Search Path Element and Dead Code issues. Each vulnerability has the potential for serious implications, including remote code execution, which can allow malicious actors to take control of affected systems.

Affected Products​

The vulnerabilities impact specific versions of ICONICS and Mitsubishi Electric products:
  • GENESIS64 AlarmWorX Multimedia (AlarmWorX64 MMX): Versions prior to 10.97.3
  • GENESIS64: Versions 10.97.2, 10.97.2 CFR1, 10.97.2 CFR2, and 10.97.3
  • Mitsubishi Electric MC Works64: All versions

Detailed Vulnerability Analysis​

1. Uncontrolled Search Path Element (CVE-2024-8299 and CVE-2024-9852)

Both vulnerabilities identified in the AlarmWorX64 MMX agents (Phone and Fax) can enable DLL hijacking, allowing unauthorized execution of malicious code. Best practices suggest ensuring that paths are adequately controlled to prevent such hijacking.
  • CVSS v3.1 Base Score: 7.8
  • CVSS v4 Base Score: 8.5
The high scoring on the CVSS indicates the potential impact and exploitability of these vulnerabilities.

2. Dead Code (CVE-2024-8300)

The Dead Code vulnerability in the GENESIS64 FA device communications driver also poses a notable risk as it similarly opens channels for DLL hijacking and malicious code execution.
  • CVSS v3.1 Base Score: 7.0
  • CVSS v4 Base Score: 7.3

Implications for Users​

The exploitation of these vulnerabilities can have devastating consequences, particularly for organizations operating in critical sectors. The potential for remote code execution means an attacker could take control of equipment, disrupt operations, or exfiltrate sensitive data.

Risk Evaluation​

The assessment indicates that the exploitation of these vulnerabilities is feasible, emphasizing the need for immediate remedial action. CISA strongly recommends conducting proper impact analyses and risk assessments before deploying security measures.

Recommendations and Mitigations​

To safeguard against these vulnerabilities, ICONICS has released the following mitigations:
  • Users should update to the latest versions (10.97.3 or later) to incorporate critical fixes.
  • For GENESIS64:
    • Version 10.97.2 should update to Critical Fixes Rollup 3.
    • Version 10.97.3 should update to Critical Fixes Rollup 1.
CISA suggests users adopt defensive measures along the following lines:
  • Proactively apply updates as they become available.
  • Consult CISA's Industrial Control Systems cybersecurity resources for best practices in protection and incident response.
  • Maintain vigilance against social engineering attacks, such as phishing, which are often leveraged to gain initial access to systems.

Conclusion​

The cybersecurity landscape is ever-changing, and vulnerabilities like those identified in the ICONICS and Mitsubishi Electric products serve as a reminder of the need for continuous vigilance and proactive management of software systems. IT administrators and users should prioritize understanding these vulnerabilities and taking the necessary actions to secure these critical infrastructure components.
For further details and updates regarding fixes and procedures, users can refer to the official advisories and documentation from ICONICS, Mitsubishi Electric, and CISA.
Stay secure, and keep your critical infrastructure protected!

This advisory underscores the importance of cybersecurity diligence in today's industrial settings. Engage with your peers in the Windows Forum community to share insights or ask questions about securing your systems against these vulnerabilities!

Source: CISA ICONICS and Mitsubishi Electric GENESIS64 Products
 


Back
Top