Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-49596 Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 09 Jan 2026 08:00:00 +0000

Type Values Removed Values Added
Title Malicious Code Execution Vulnerability in GENESIS64 and MC Works64 Malicious Code Execution Vulnerability in GENESIS64, ICONICS Suite, MC Works64, and GENESIS32

Fri, 09 Jan 2026 07:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products. Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.

Fri, 06 Dec 2024 05:30:00 +0000

Type Values Removed Values Added
References

Fri, 29 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Iconics
Iconics genesis64
Mitsubishielectric
Mitsubishielectric mc Works64
CPEs cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*
cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*
Vendors & Products Iconics
Iconics genesis64
Mitsubishielectric
Mitsubishielectric mc Works64
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 28 Nov 2024 22:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
Title Malicious Code Execution Vulnerability in GENESIS64 and MC Works64
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published:

Updated: 2026-01-09T07:42:09.258Z

Reserved: 2024-08-29T06:26:34.979Z

Link: CVE-2024-8299

cve-icon Vulnrichment

Updated: 2024-11-29T16:40:36.798Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-28T23:15:03.843

Modified: 2026-01-09T08:15:55.177

Link: CVE-2024-8299

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses