First published: Fri Sep 17 2021(Updated: )
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dopsoft | >=2.00<=2.00.07 | |
Delta Electronics DOPSoft 2: Version 2.00.07 and prior |
DOPSoft 2 will not receive an update to mitigate these vulnerabilities because it is an end-of-life product. Delta Electronics recommends users to switch to the replacement software when available
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-38404.
The severity of CVE-2021-38404 is high with a CVSS score of 7.8.
The affected software is Delta Electronic DOPSoft 2 (Version 2.00.07 and prior).
The vulnerability could result in a heap-based buffer overflow, allowing an attacker to execute code in the context of the current process.
Please refer to the vendor's website or security advisories for information on available fixes or patches.