{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-8300","assignerOrgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","state":"PUBLISHED","assignerShortName":"Mitsubishi","dateReserved":"2024-08-29T06:26:41.397Z","datePublished":"2024-11-28T22:18:28.358Z","dateUpdated":"2026-01-09T07:52:13.107Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"Version 10.97.2"},{"status":"affected","version":"Version 10.97.2 CFR1"},{"status":"affected","version":"Version 10.97.2 CRF2"},{"status":"affected","version":"Version 10.97.3"}]},{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"Version 10.97.2"},{"status":"affected","version":"Version 10.97.2 CFR1"},{"status":"affected","version":"Version 10.97.2 CRF2"},{"status":"affected","version":"Version 10.97.3"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"Version 10.97.2"},{"status":"affected","version":"Version 10.97.2 CFR1"},{"status":"affected","version":"Version 10.97.2 CRF2"},{"status":"affected","version":"Version 10.97.3"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"Version 10.97.2"},{"status":"affected","version":"Version 10.97.2 CFR1"},{"status":"affected","version":"Version 10.97.2 CRF2"},{"status":"affected","version":"Version 10.97.3"}]}],"credits":[{"lang":"en","type":"finder","value":"Asher Davila of Palo Alto Networks"},{"lang":"en","type":"finder","value":"Malav Vyas of Palo Alto Networks"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Dead Code vulnerability in Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric Iconics Digital Solutions GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, and Mitsubishi Electric Iconics Digital Solutions ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products."}],"value":"Dead Code vulnerability in Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric Iconics Digital Solutions GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, and Mitsubishi Electric Iconics Digital Solutions ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products."}],"impacts":[{"descriptions":[{"lang":"en","value":"Malicious Code Execution"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-561","description":"CWE-561 Dead Code","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","shortName":"Mitsubishi","dateUpdated":"2026-01-09T07:52:13.107Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf"},{"tags":["government-resource"],"url":"https://jvn.jp/vu/JVNVU93891820"},{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04"}],"source":{"discovery":"UNKNOWN"},"title":"Malicious Code Execution Vulnerability in GENESIS64 and ICONICS Suite","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"iconics","product":"genesis64","cpes":["cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"10.97.2","status":"affected"},{"version":"10.97.2cfr1","status":"affected"},{"version":"10.97.2cfr2","status":"affected"},{"version":"10.97.3","status":"affected"}]},{"vendor":"mitsubishielectric","product":"genesis64","cpes":["cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"10.97.2","status":"affected"},{"version":"10.97.2cfr1","status":"affected"},{"version":"10.97.2cfr2","status":"affected"},{"version":"10.97.3","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-29T18:50:37.535229Z","id":"CVE-2024-8300","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-29T18:53:27.840Z"}}]}}