Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9852: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Corporation GENESIS64

0
High
VulnerabilityCVE-2024-9852cvecve-2024-9852cwe-427
Published: Thu Nov 28 2024 (11/28/2024, 22:20:28 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: GENESIS64

Description

Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.

AI-Powered Analysis

AILast updated: 01/09/2026, 07:57:21 UTC

Technical Analysis

CVE-2024-9852 is an Uncontrolled Search Path Element vulnerability (CWE-427) present in all versions of Mitsubishi Electric Corporation's GENESIS64, GENESIS32, MC Works64, ICONICS Suite, and related products. These products are widely used in industrial automation, SCADA, and building management systems. The vulnerability arises because the software improperly handles the search path for dynamic link libraries (DLLs), allowing a local authenticated attacker to place a malicious DLL in a specific folder that the application loads. This can lead to arbitrary code execution with the privileges of the affected application. The attacker does not require elevated privileges beyond local authentication and does not need user interaction to exploit the flaw. Successful exploitation can result in disclosure, modification, or destruction of sensitive data, as well as denial of service conditions, severely impacting operational technology environments. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. No patches or known exploits are currently available, making proactive mitigation critical. The vulnerability affects all versions of the listed products, indicating a systemic issue in the software's DLL loading mechanism.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and building management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control or disruption of industrial processes, resulting in operational downtime, safety hazards, and potential regulatory non-compliance. The ability to execute arbitrary code locally could allow attackers to pivot within networks, escalate privileges, or exfiltrate sensitive operational data. Given the widespread use of Mitsubishi Electric's GENESIS and ICONICS products in European industrial environments, the impact could extend to national critical infrastructure, causing economic and safety repercussions. The denial of service potential could interrupt essential services, while data tampering could undermine trust in automated control systems. The requirement for local authentication limits remote exploitation but does not eliminate risk, as insider threats or compromised credentials could be leveraged.

Mitigation Recommendations

European organizations should immediately implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric software. Employ application whitelisting and integrity monitoring to detect unauthorized DLLs or changes in critical directories. Network segmentation should isolate industrial control systems from general IT networks to reduce the risk of lateral movement. Regularly audit and monitor logs for suspicious local activity indicative of DLL planting attempts. Engage with Mitsubishi Electric for timely updates and patches once released, and plan for rapid deployment. Consider deploying endpoint detection and response (EDR) solutions tailored for industrial environments to detect anomalous behaviors. Additionally, implement multi-factor authentication for local access where possible to reduce the risk of credential compromise. Conduct user training to raise awareness about the risks of local privilege misuse. Finally, develop and test incident response plans specific to industrial control system compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2024-10-11T01:20:49.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b130ecefc3cd7c0f7cee

Added to database: 1/9/2026, 7:41:36 AM

Last enriched: 1/9/2026, 7:57:21 AM

Last updated: 1/10/2026, 10:16:42 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats