OTPulse

Fuji Electric Tellus Lite V-Simulator (Update A)

Monitor7.8ICS-CERT ICSA-24-338-06Dec 3, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Fuji Electric Tellus Lite V-Simulator contains multiple buffer overflow vulnerabilities (CVE-2024-11799, CVE-2024-11800, CVE-2024-11801, CVE-2024-11802, CVE-2024-11803) in the simulator component that could crash the application when a user opens a malicious file. VS5Sim (V-Simulator Ver5) is vulnerable to these issues. V-Simulator Ver6 includes screening to prevent exploitation of the first three CVEs. Fuji Electric released TELLUS V4.0.22.0 in May 2025 with fixes for CVE-2024-11802 and CVE-2024-11803, replacing V-Simulator Ver5 with Ver6 in new packages.

What this means
What could happen
An attacker could craft a malicious file that, when opened by a user in the simulator, crashes the V-Simulator application. Since this is a design and simulation tool rather than a runtime control system, the impact is disruption to engineering work and potential loss of unsaved design data rather than direct impact to field operations.
Who's at risk
Energy sector organizations using Fuji Electric Tellus Lite V-Simulator Ver5 (version 4.0.20.0 and earlier) for PLC programming, logic simulation, and system design. This affects engineering teams and technicians who use the simulator for offline testing and validation of control logic before deployment to production systems. The impact is limited to the engineering workstation running the simulator, not to operational field devices.
How it could be exploited
An attacker sends a malicious file (likely via email or web download) to an engineer or technician. When the user opens this file in Tellus Lite V-Simulator Ver5, the buffer overflow vulnerability is triggered, causing the simulator to crash. The attacker would need to socially engineer the user into opening the file.
Prerequisites
  • <parameter name="item">Tellus Lite V-Simulator Ver5 must be installed (vulnerability present in 4.0.20.0 and earlier)
<parameter name="item">Requires user interaction (opening file)
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (1)
ProductAffected VersionsFix Status
Tellus Lite: 4.0.20.04.0.20.0No fix yet
Remediation & Mitigation

VS5Sim is a simulator of V-SFT Ver5 packaged with TELLUS Lite. VS6Sim screens incoming data to prevent malicious files from exploiting CVE-2024-11799, CVE-2024-11800, and CVE-2024-11801. Fuji Electric has replaced V-SFT Ver5 with V-SFT Ver6 in new versions of TELLUS lite. In May 2025, Fuji Electric released TELLUS V4.0.22.0 which fixes CVE-2024-11802 and CVE-2024-11803 in V-Simulator Ver6. Consequently, V-Simulator Ver5 will be removed from the package and replaced with V-Simulator Ver6. Users are encouraged to download the latest version. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting these vulnerabilities have been reported to CISA at this time. These vulnerabilities are not exploitable remotely.

โ†‘โ†“ Navigate ยท Esc Close
API: /api/v1/advisories/6754b32a-ec0f-4447-8e7b-930820f04678
Fuji Electric Tellus Lite V-Simulator (Update A) | CVSS 7.8 - OTPulse