Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11803: CWE-787: Out-of-bounds Write in Fuji Electric Tellus Lite

0
High
VulnerabilityCVE-2024-11803cvecve-2024-11803cwe-787
Published: Wed Nov 27 2024 (11/27/2024, 23:35:16 UTC)
Source: CVE Database V5
Vendor/Project: Fuji Electric
Product: Tellus Lite

Description

CVE-2024-11803 is a high-severity remote code execution vulnerability in Fuji Electric Tellus Lite V-Simulator 5 version 4. 0. 20. 0. The flaw arises from an out-of-bounds write during parsing of V8 files due to improper validation of user-supplied data. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage. Successful exploitation allows attackers to execute arbitrary code within the context of the affected process, compromising confidentiality, integrity, and availability. No known exploits are currently in the wild, but the vulnerability poses a significant risk to organizations using this software. Mitigation involves applying patches once available and restricting exposure to untrusted files and web content. Countries with significant industrial automation sectors using Fuji Electric products, including Japan, the United States, Germany, South Korea, and China, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:27:06 UTC

Technical Analysis

CVE-2024-11803 is a vulnerability identified in Fuji Electric Tellus Lite V-Simulator 5, specifically version 4.0.20.0. The vulnerability is classified as CWE-787, an out-of-bounds write, which occurs during the parsing of V8 files by the V-Simulator 5 component. The root cause is the lack of proper validation of user-supplied data, allowing an attacker to write data beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely. The attack vector requires user interaction, such as opening a maliciously crafted V8 file or visiting a malicious webpage that triggers the vulnerable parser. The CVSS v3.0 base score is 7.8, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a critical risk due to the potential for remote code execution in industrial control environments. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-24771 and published on November 27, 2024. Fuji Electric Tellus Lite is used in industrial automation and control systems, making this vulnerability particularly concerning for operational technology environments.

Potential Impact

The impact of CVE-2024-11803 is significant for organizations using Fuji Electric Tellus Lite in industrial automation and control systems. Successful exploitation allows remote attackers to execute arbitrary code with the privileges of the affected application, potentially leading to full system compromise. This can result in unauthorized access to sensitive operational data, manipulation of control processes, disruption of industrial operations, and potential safety hazards. The compromise of such systems can have cascading effects on critical infrastructure, manufacturing, and energy sectors. Given the high confidentiality, integrity, and availability impacts, attackers could steal proprietary information, alter control commands, or cause denial of service. The requirement for user interaction limits exploitation somewhat but does not eliminate risk, especially in environments where users may open files from untrusted sources or access malicious web content. The absence of known exploits in the wild provides a window for proactive mitigation, but the threat remains high due to the critical nature of affected systems.

Mitigation Recommendations

1. Apply patches and updates from Fuji Electric as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict the use of Fuji Electric Tellus Lite V-Simulator 5 to trusted environments and avoid opening files from untrusted or unknown sources. 3. Implement strict network segmentation to isolate industrial control systems running Tellus Lite from general IT networks and the internet. 4. Employ application whitelisting and endpoint protection solutions to detect and block attempts to execute unauthorized code. 5. Educate users about the risks of opening files from untrusted sources and visiting suspicious websites, emphasizing the need for caution with V8 files. 6. Monitor logs and network traffic for unusual activity that may indicate exploitation attempts. 7. Consider disabling or restricting the V8 file parsing functionality if feasible until a patch is applied. 8. Collaborate with Fuji Electric support for guidance and to receive timely updates on remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-26T16:02:55.924Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e20b7ef31ef0b59665f

Added to database: 2/25/2026, 9:48:16 PM

Last enriched: 2/26/2026, 5:27:06 AM

Last updated: 2/26/2026, 8:07:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats