First published: Thu Nov 28 2024(Updated: )
Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS64 | ||
ICONICS GENESIS64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-8300 is rated as high due to the potential for local authenticated attackers to execute arbitrary code.
To fix CVE-2024-8300, users should update to the latest patched version of ICONICS GENESIS64 or Mitsubishi Electric GENESIS64.
CVE-2024-8300 affects users of ICONICS GENESIS64 and Mitsubishi Electric GENESIS64 versions 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2, and 10.97.3.
CVE-2024-8300 is categorized as a dead code vulnerability, which can be exploited by attackers to execute malicious code.
The potential risks of CVE-2024-8300 include unauthorized code execution and potential system compromise if exploited by attackers.