CVE-2024-11803: CWE-787: Out-of-bounds Write in Fuji Electric Tellus Lite
CVE-2024-11803 is a high-severity remote code execution vulnerability in Fuji Electric Tellus Lite V-Simulator 5 version 4. 0. 20. 0. The flaw arises from an out-of-bounds write during parsing of V8 files due to improper validation of user-supplied data. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage. Successful exploitation allows attackers to execute arbitrary code within the context of the affected process, compromising confidentiality, integrity, and availability. No known exploits are currently in the wild, but the vulnerability poses a significant risk to organizations using this software. Mitigation involves applying patches once available and restricting exposure to untrusted files and web content. Countries with significant industrial automation sectors using Fuji Electric products, including Japan, the United States, Germany, South Korea, and China, are most at risk.
AI Analysis
Technical Summary
CVE-2024-11803 is a vulnerability identified in Fuji Electric Tellus Lite V-Simulator 5, specifically version 4.0.20.0. The vulnerability is classified as CWE-787, an out-of-bounds write, which occurs during the parsing of V8 files by the V-Simulator 5 component. The root cause is the lack of proper validation of user-supplied data, allowing an attacker to write data beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely. The attack vector requires user interaction, such as opening a maliciously crafted V8 file or visiting a malicious webpage that triggers the vulnerable parser. The CVSS v3.0 base score is 7.8, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a critical risk due to the potential for remote code execution in industrial control environments. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-24771 and published on November 27, 2024. Fuji Electric Tellus Lite is used in industrial automation and control systems, making this vulnerability particularly concerning for operational technology environments.
Potential Impact
The impact of CVE-2024-11803 is significant for organizations using Fuji Electric Tellus Lite in industrial automation and control systems. Successful exploitation allows remote attackers to execute arbitrary code with the privileges of the affected application, potentially leading to full system compromise. This can result in unauthorized access to sensitive operational data, manipulation of control processes, disruption of industrial operations, and potential safety hazards. The compromise of such systems can have cascading effects on critical infrastructure, manufacturing, and energy sectors. Given the high confidentiality, integrity, and availability impacts, attackers could steal proprietary information, alter control commands, or cause denial of service. The requirement for user interaction limits exploitation somewhat but does not eliminate risk, especially in environments where users may open files from untrusted sources or access malicious web content. The absence of known exploits in the wild provides a window for proactive mitigation, but the threat remains high due to the critical nature of affected systems.
Mitigation Recommendations
1. Apply patches and updates from Fuji Electric as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict the use of Fuji Electric Tellus Lite V-Simulator 5 to trusted environments and avoid opening files from untrusted or unknown sources. 3. Implement strict network segmentation to isolate industrial control systems running Tellus Lite from general IT networks and the internet. 4. Employ application whitelisting and endpoint protection solutions to detect and block attempts to execute unauthorized code. 5. Educate users about the risks of opening files from untrusted sources and visiting suspicious websites, emphasizing the need for caution with V8 files. 6. Monitor logs and network traffic for unusual activity that may indicate exploitation attempts. 7. Consider disabling or restricting the V8 file parsing functionality if feasible until a patch is applied. 8. Collaborate with Fuji Electric support for guidance and to receive timely updates on remediation.
Affected Countries
Japan, United States, Germany, South Korea, China, Taiwan, France, Italy, United Kingdom, Canada
CVE-2024-11803: CWE-787: Out-of-bounds Write in Fuji Electric Tellus Lite
Description
CVE-2024-11803 is a high-severity remote code execution vulnerability in Fuji Electric Tellus Lite V-Simulator 5 version 4. 0. 20. 0. The flaw arises from an out-of-bounds write during parsing of V8 files due to improper validation of user-supplied data. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage. Successful exploitation allows attackers to execute arbitrary code within the context of the affected process, compromising confidentiality, integrity, and availability. No known exploits are currently in the wild, but the vulnerability poses a significant risk to organizations using this software. Mitigation involves applying patches once available and restricting exposure to untrusted files and web content. Countries with significant industrial automation sectors using Fuji Electric products, including Japan, the United States, Germany, South Korea, and China, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-11803 is a vulnerability identified in Fuji Electric Tellus Lite V-Simulator 5, specifically version 4.0.20.0. The vulnerability is classified as CWE-787, an out-of-bounds write, which occurs during the parsing of V8 files by the V-Simulator 5 component. The root cause is the lack of proper validation of user-supplied data, allowing an attacker to write data beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely. The attack vector requires user interaction, such as opening a maliciously crafted V8 file or visiting a malicious webpage that triggers the vulnerable parser. The CVSS v3.0 base score is 7.8, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a critical risk due to the potential for remote code execution in industrial control environments. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-24771 and published on November 27, 2024. Fuji Electric Tellus Lite is used in industrial automation and control systems, making this vulnerability particularly concerning for operational technology environments.
Potential Impact
The impact of CVE-2024-11803 is significant for organizations using Fuji Electric Tellus Lite in industrial automation and control systems. Successful exploitation allows remote attackers to execute arbitrary code with the privileges of the affected application, potentially leading to full system compromise. This can result in unauthorized access to sensitive operational data, manipulation of control processes, disruption of industrial operations, and potential safety hazards. The compromise of such systems can have cascading effects on critical infrastructure, manufacturing, and energy sectors. Given the high confidentiality, integrity, and availability impacts, attackers could steal proprietary information, alter control commands, or cause denial of service. The requirement for user interaction limits exploitation somewhat but does not eliminate risk, especially in environments where users may open files from untrusted sources or access malicious web content. The absence of known exploits in the wild provides a window for proactive mitigation, but the threat remains high due to the critical nature of affected systems.
Mitigation Recommendations
1. Apply patches and updates from Fuji Electric as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict the use of Fuji Electric Tellus Lite V-Simulator 5 to trusted environments and avoid opening files from untrusted or unknown sources. 3. Implement strict network segmentation to isolate industrial control systems running Tellus Lite from general IT networks and the internet. 4. Employ application whitelisting and endpoint protection solutions to detect and block attempts to execute unauthorized code. 5. Educate users about the risks of opening files from untrusted sources and visiting suspicious websites, emphasizing the need for caution with V8 files. 6. Monitor logs and network traffic for unusual activity that may indicate exploitation attempts. 7. Consider disabling or restricting the V8 file parsing functionality if feasible until a patch is applied. 8. Collaborate with Fuji Electric support for guidance and to receive timely updates on remediation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-11-26T16:02:55.924Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6e20b7ef31ef0b59665f
Added to database: 2/25/2026, 9:48:16 PM
Last enriched: 2/26/2026, 5:27:06 AM
Last updated: 2/26/2026, 8:07:21 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.