ICONICS GENESIS64 and Mitsubishi Electric MC Works64
Buffer overflow and out-of-bounds read vulnerabilities in ICONICS GENESIS64 (all versions up to 10.97) and Mitsubishi Electric MC Works64 (all versions up to 4.04E) allow code execution when a user opens a malicious AutoCAD DWG file or is socially engineered to click a malicious link. The vulnerabilities exist in file parsing logic and require local access and user interaction. ICONICS has stated that GENESIS64 Version 10.97.1 and later will not be vulnerable. No public exploits are currently known, and these vulnerabilities are not remotely exploitable.
- Local access to a workstation or engineering station running GENESIS64 (version 10.97 or earlier) or MC Works64 (version 4.04E or earlier)
- User must open a malicious AutoCAD DWG file or click a malicious email link
- Attacker relies on social engineering rather than network-level exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7fc95e46-54c0-4ac9-8cdd-b068a2925b16Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.