CVE-2024-1574
Mitsubishi Electric ICONICS GENESIS64 vulnerability analysis and mitigation

Overview

CVE-2024-1574 is a Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability affecting the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, and Mitsubishi Electric MC Works64 all versions. The vulnerability was disclosed on July 4, 2024 (NVD, CISA).

Technical details

The vulnerability is classified as CWE-470 (Use of Externally-Controlled Input to Select Classes or Code) and exists in the licensing service used by ICONICS licensing. It has been assigned a CVSS v3.1 base score of 6.7 MEDIUM with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H. The vulnerability requires local access, high attack complexity, low privileges, and user interaction to exploit (CISA).

Impact

Successful exploitation of this vulnerability could allow a local attacker to execute malicious code with administrative privileges by tampering with a specific file that is not protected by the system. The vulnerability affects critical manufacturing sectors worldwide (CISA).

Mitigation and workarounds

ICONICS has released version 10.97.3 which contains fixes for this vulnerability. For MC Works64 users, Mitsubishi Electric recommends following the mitigations described in their security advisory as there are no plans to release a fix version. CISA recommends minimizing network exposure for control system devices, ensuring they are not accessible from the internet, and locating control system networks and remote devices behind firewalls isolated from business networks (CISA).

Additional resources


SourceThis report was generated using AI

Related Mitsubishi Electric ICONICS GENESIS64 vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-7587HIGH7.8
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoOct 22, 2024
CVE-2022-40264HIGH7.1
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoDec 14, 2022
CVE-2024-8300HIGH7
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoNov 28, 2024
CVE-2024-1574MEDIUM6.7
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoJul 04, 2024
CVE-2024-1573MEDIUM5.9
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoJul 04, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management