VYPR
advisoryPublished May 12, 2026· Updated May 18, 2026· 1 source

CISA Warns of High-Severity Privilege Escalation Flaw in Fuji Electric Tellus

CISA has disclosed a high-severity vulnerability in Fuji Electric Tellus 5.0.2 that allows local attackers to escalate privileges to SYSTEM via an exposed kernel driver.

CISA has published an advisory warning of a high-severity vulnerability in Fuji Electric Tellus 5.0.2, tracked as CVE-2026-8108. The flaw carries a CVSS score of 7.8 and stems from the installation of a kernel driver that grants all users read and write permissions, exposing a dangerous method or function (CWE-749). An attacker with local low-privileged access can exploit this to elevate privileges to SYSTEM, potentially causing denial of service, or opening or deleting files.

The affected product is Fuji Electric Tellus version 5.0.2, a human-machine interface (HMI) software widely used in critical manufacturing sectors. The vulnerability was reported to CISA by Kim Myung-gyu of Trend Micro Zero Day Initiative. No public exploitation has been reported to date, and the vulnerability is not exploitable remotely.

Fuji Electric recommends that Tellus be installed only with administrator privileges as a mitigation. CISA advises organizations to perform proper impact analysis and risk assessment before deploying defensive measures, and to follow recommended practices for securing industrial control systems.

This advisory is part of CISA's ongoing effort to address vulnerabilities in ICS equipment. The agency emphasizes that while no active exploitation has been observed in the wild, the severity of the flaw warrants immediate attention from asset owners in critical manufacturing sectors worldwide.

The vulnerability highlights the risks posed by insecure driver installations in industrial software. As HMIs often run on Windows-based systems with broad access to plant networks, a local privilege escalation could serve as a stepping stone for deeper compromise. Organizations using Fuji Electric Tellus should review their deployment configurations and ensure strict access controls are in place.

Synthesized by Vypr AI