CVE-2024-9852: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Corporation GENESIS64
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
AI Analysis
Technical Summary
CVE-2024-9852 is an Uncontrolled Search Path Element vulnerability (CWE-427) present in all versions of Mitsubishi Electric Corporation's GENESIS64, GENESIS32, MC Works64, ICONICS Suite, and related products. These products are widely used in industrial automation, SCADA, and building management systems. The vulnerability arises because the software improperly handles the search path for dynamic link libraries (DLLs), allowing a local authenticated attacker to place a malicious DLL in a specific folder that the application loads. This can lead to arbitrary code execution with the privileges of the affected application. The attacker does not require elevated privileges beyond local authentication and does not need user interaction to exploit the flaw. Successful exploitation can result in disclosure, modification, or destruction of sensitive data, as well as denial of service conditions, severely impacting operational technology environments. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. No patches or known exploits are currently available, making proactive mitigation critical. The vulnerability affects all versions of the listed products, indicating a systemic issue in the software's DLL loading mechanism.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and building management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control or disruption of industrial processes, resulting in operational downtime, safety hazards, and potential regulatory non-compliance. The ability to execute arbitrary code locally could allow attackers to pivot within networks, escalate privileges, or exfiltrate sensitive operational data. Given the widespread use of Mitsubishi Electric's GENESIS and ICONICS products in European industrial environments, the impact could extend to national critical infrastructure, causing economic and safety repercussions. The denial of service potential could interrupt essential services, while data tampering could undermine trust in automated control systems. The requirement for local authentication limits remote exploitation but does not eliminate risk, as insider threats or compromised credentials could be leveraged.
Mitigation Recommendations
European organizations should immediately implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric software. Employ application whitelisting and integrity monitoring to detect unauthorized DLLs or changes in critical directories. Network segmentation should isolate industrial control systems from general IT networks to reduce the risk of lateral movement. Regularly audit and monitor logs for suspicious local activity indicative of DLL planting attempts. Engage with Mitsubishi Electric for timely updates and patches once released, and plan for rapid deployment. Consider deploying endpoint detection and response (EDR) solutions tailored for industrial environments to detect anomalous behaviors. Additionally, implement multi-factor authentication for local access where possible to reduce the risk of credential compromise. Conduct user training to raise awareness about the risks of local privilege misuse. Finally, develop and test incident response plans specific to industrial control system compromises.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2024-9852: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Corporation GENESIS64
Description
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
AI-Powered Analysis
Technical Analysis
CVE-2024-9852 is an Uncontrolled Search Path Element vulnerability (CWE-427) present in all versions of Mitsubishi Electric Corporation's GENESIS64, GENESIS32, MC Works64, ICONICS Suite, and related products. These products are widely used in industrial automation, SCADA, and building management systems. The vulnerability arises because the software improperly handles the search path for dynamic link libraries (DLLs), allowing a local authenticated attacker to place a malicious DLL in a specific folder that the application loads. This can lead to arbitrary code execution with the privileges of the affected application. The attacker does not require elevated privileges beyond local authentication and does not need user interaction to exploit the flaw. Successful exploitation can result in disclosure, modification, or destruction of sensitive data, as well as denial of service conditions, severely impacting operational technology environments. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. No patches or known exploits are currently available, making proactive mitigation critical. The vulnerability affects all versions of the listed products, indicating a systemic issue in the software's DLL loading mechanism.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and building management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control or disruption of industrial processes, resulting in operational downtime, safety hazards, and potential regulatory non-compliance. The ability to execute arbitrary code locally could allow attackers to pivot within networks, escalate privileges, or exfiltrate sensitive operational data. Given the widespread use of Mitsubishi Electric's GENESIS and ICONICS products in European industrial environments, the impact could extend to national critical infrastructure, causing economic and safety repercussions. The denial of service potential could interrupt essential services, while data tampering could undermine trust in automated control systems. The requirement for local authentication limits remote exploitation but does not eliminate risk, as insider threats or compromised credentials could be leveraged.
Mitigation Recommendations
European organizations should immediately implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric software. Employ application whitelisting and integrity monitoring to detect unauthorized DLLs or changes in critical directories. Network segmentation should isolate industrial control systems from general IT networks to reduce the risk of lateral movement. Regularly audit and monitor logs for suspicious local activity indicative of DLL planting attempts. Engage with Mitsubishi Electric for timely updates and patches once released, and plan for rapid deployment. Consider deploying endpoint detection and response (EDR) solutions tailored for industrial environments to detect anomalous behaviors. Additionally, implement multi-factor authentication for local access where possible to reduce the risk of credential compromise. Conduct user training to raise awareness about the risks of local privilege misuse. Finally, develop and test incident response plans specific to industrial control system compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2024-10-11T01:20:49.722Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7cee
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/9/2026, 7:57:21 AM
Last updated: 1/10/2026, 10:16:42 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.