Delta Electronics created new software versions to mitigate vulnerabilities in its WPLSoft, ISPSoft, and PMSoft software applications, according to a report with ICS-CERT.

The vulnerabilities, discovered by researchers axt and Ariele Caltabiano each working with Trend Micro’s Zero Day Initiative (ZDI), are not remotely exploitable.

Siemens Clears ActiveX Vulnerability
Siemens Advisory on Mitigating PLC Holes
INTERSCHALT Clears Path Traversal
Adcon Mitigates Gateway Issues

The following products and versions suffer from the issues:
• WPLSoft, Versions prior to V2.42.11
• ISPSoft, Versions prior to 3.02.11
• PMSoft, Versions prior to2.10.10

Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code.

Schneider Bold

Delta Electronics is a Taiwan-based company that maintains offices in several countries around the world, including China, Japan, South Korea, Singapore, India, Brazil, and the U.S.

The affected products, WPLSoft, ISPSoft, and PMSoft, are platforms for editing the control software of Delta DVP series motion controlling programmable logic controllers (PLCs).

These platforms see use to prepare process control systems (PCSs) for deployment across a variety of industrial automation environments within the critical manufacturing sector. Delta Electronics estimates these products primarily see action in in Asia and Europe with a small percentage in the U.S.

In one vulnerability, there are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service.

CVE-2016-5805 is the case number assigned to these vulnerabilities, which have a CVSS v3 base score of 7.8.

In addition, there are multiple instances of out-of-bounds conditions that may allow malicious files to end up read and executed by the affected software.

CVE-2016-5802 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.8.

These vulnerabilities are not exploitable remotely and cannot end up exploited without user interaction. These exploits can trigger when a local user runs the vulnerable application and loads malformed files with .dvp or other extensions.

No known public exploits specifically target these vulnerabilities in these products.

Crafting a working exploit for these vulnerabilities would be difficult. Social engineering would be mandatory to convince the user to accept the malformed file. Additional user interaction would end up needed to load the malformed file. This decreases the likelihood of a successful exploit.

Delta Electronics recommends affected users update their software to the latest versions ISPSoft V3.02.11, PMSoft V2.10.10, and WPLSoft V2.42.11 available through the following links:
ISPSoft V3.02.11
PMSoft V2.10.10
WPLSoft V2.42.11

Pin It on Pinterest

Share This