First published: Mon Aug 30 2021(Updated: )
A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior may be exploited by processing a specially crafted project file, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dopsoft | <=4.00.11 | |
Delta Industrial Automation DOPSoft | ||
Delta Electronics DOPSoft Version 4.00.11 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Delta Industrial Automation DOPSoft vulnerability is CVE-2021-33019.
The severity of CVE-2021-33019 is high with a CVSS score of 7.8.
Remote attackers can exploit CVE-2021-33019 by executing arbitrary code on affected installations of Delta Industrial Automation DOPSoft through user interaction with a malicious page or file.
The affected software and version of CVE-2021-33019 is Delta Industrial Automation DOPSoft up to version 4.00.11.
Yes, there are references and advisories available for CVE-2021-33019. They can be found at the following links: [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-21-238-04) and [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-21-1059/).