Fuji Electric Tellus

Summary

A vulnerability in Fuji Electric Tellus version 5.0.2 allows any user to gain read and write permissions to the kernel driver, potentially enabling privilege escalation. Successful exploitation could lead to temporary denial of service, file opening, or file deletion.

IFF Assessment

FOE

This vulnerability allows for privilege escalation, enabling attackers to gain unauthorized access and control over the system, which is detrimental to defenders.

Severity

7.8 High

The CVSS score of 7.8 (HIGH) is based on a local attack vector (AV:L), low complexity (AC:L), and low privileges required (PR:L). The impact is high across confidentiality (C:H), integrity (I:H), and availability (A:H) due to the ability to elevate privileges and perform disruptive actions.

Defender Context

Defenders need to be aware of this privilege escalation vulnerability in Fuji Electric Tellus, as it affects critical manufacturing sectors and is deployed worldwide. Prompt patching or mitigation, such as enforcing administrator-only installation, is crucial to prevent attackers from gaining deep system access.

Read Full Story →