Delta Electronics released new software to mitigate a stack-based buffer overflow in its Delta Industrial Automation COMMGR, according to a report with NCCIC.
Successful exploitation of this remotely exploitable vulnerability, reported by an anonymous researcher working with Trend Micro’s Zero Day Initiative, may allow remote code execution, cause the application to crash, or cause a denial-of-service condition in the application server.
The following versions of Delta Industrial Automation COMMGR, a communication management software, and accompanying PLC simulators suffer from the issue:
• COMMGR Version 1.08 and prior.
• DVPSimulator EH2, EH3, ES2, SE, SS2
• AHSIM_5x0, AHSIM_5x1
In the vulnerability, the application utilizes a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the application server.
CVE-2018-10594 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.3.
The product sees use in the commercial facilities, communications, critical manufacturing, energy, and healthcare and public health sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Taiwan-based Delta Electronics released COMMGR v1.09 to address this vulnerability and recommends users upgrade. Click here to download the updated version.
Delta Electronics also recommends affected users apply application whitelists to allow only trusted communications via Ports 502 and 10002.