Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 29 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iconics
Iconics genesis64 Mitsubishielectric Mitsubishielectric genesis64 Mitsubishielectric mc Works64 |
|
CPEs | cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:* cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:* cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Iconics
Iconics genesis64 Mitsubishielectric Mitsubishielectric genesis64 Mitsubishielectric mc Works64 |
|
Metrics |
ssvc
|
Thu, 28 Nov 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products. | |
Title | Malicious Code Execution Vulnerability in GENESIS64 and MC Works64 | |
Weaknesses | CWE-427 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Mitsubishi
Published: 2024-11-28T22:20:28.303Z
Updated: 2024-12-06T05:23:50.441Z
Reserved: 2024-10-11T01:20:49.722Z
Link: CVE-2024-9852
Vulnrichment
Updated: 2024-11-29T18:43:24.921Z
NVD
Status : Awaiting Analysis
Published: 2024-11-28T23:15:04.890
Modified: 2024-12-06T06:15:23.200
Link: CVE-2024-9852
Redhat
No data.