Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1574: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Mitsubishi Electric Iconics Digital Solutions GENESIS64

0
Medium
VulnerabilityCVE-2024-1574cvecve-2024-1574cwe-470
Published: Thu Jul 04 2024 (07/04/2024, 09:02:35 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Iconics Digital Solutions
Product: GENESIS64

Description

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in the licensing feature of Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, Mitsubishi Electric Iconics Digital Solutions BizViz versions 9.7 and prior, Mitsubishi Electric BizViz versions 9.7 and prior, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system.

AI-Powered Analysis

AILast updated: 01/08/2026, 12:19:33 UTC

Technical Analysis

CVE-2024-1574 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as Unsafe Reflection) affecting Mitsubishi Electric Iconics Digital Solutions products including GENESIS64 versions 10.97 to 10.97.2, GENESIS32 versions 9.7 and prior, BizViz versions 9.7 and prior, and all versions of MC Works64. The flaw exists in the licensing feature where an attacker with local access can tamper with a specific file that the system does not adequately protect. This tampering allows the attacker to influence the reflection mechanism to load and execute malicious code with administrative privileges. The vulnerability requires local access, elevated privileges (low privileges but not full admin initially), and user interaction, making remote exploitation infeasible without prior compromise. The CVSS v3.1 base score is 6.7, reflecting medium severity with high impact on confidentiality, integrity, and availability, but with higher attack complexity and required user interaction. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation relies on access control and monitoring until vendor fixes are released. The vulnerability is particularly critical in industrial control systems where GENESIS64 and related products are used for automation and monitoring, as malicious code execution with admin rights could disrupt operations or cause safety issues.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on Mitsubishi Electric Iconics Digital Solutions products, this vulnerability poses a significant risk. Successful exploitation could lead to full administrative control over affected systems, enabling attackers to manipulate industrial processes, steal sensitive operational data, disrupt service availability, or cause physical damage. The confidentiality of proprietary process data and intellectual property could be compromised. Integrity of control commands and system configurations could be altered, potentially leading to unsafe operational states. Availability could be impacted by malicious code causing system crashes or denial of service. Given the local access requirement, the threat is heightened in environments where insider threats or inadequate endpoint security exist. The lack of file protection on licensing files indicates a potential systemic weakness in access controls that could be exploited by attackers who gain initial foothold through phishing or other means.

Mitigation Recommendations

European organizations should implement strict local access controls and file system permissions to prevent unauthorized modification of licensing files related to GENESIS64 and other affected products. Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution. Monitor file integrity of licensing and configuration files using host-based intrusion detection systems. Limit user privileges to the minimum necessary and enforce strong authentication to reduce the risk of privilege escalation. Segregate critical industrial control systems from general IT networks to reduce exposure. Until official patches are released by Mitsubishi Electric, consider deploying virtual patching or compensating controls such as enhanced logging and anomaly detection for suspicious local activities. Regularly audit and update software versions and maintain close communication with the vendor for timely patch deployment. Conduct security awareness training to reduce risks of initial compromise that could lead to local access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2024-02-16T01:30:45.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695f9d8ec901b06321e41284

Added to database: 1/8/2026, 12:05:34 PM

Last enriched: 1/8/2026, 12:19:33 PM

Last updated: 1/9/2026, 7:29:25 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats