First published: Thu Sep 09 2021(Updated: )
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dopsoft | >=2.00<=2.00.07 | |
Delta Electronics DOPSoft 2: Version 2.00.07 and prior | ||
Delta Electronics DOPSoft 2 | ||
>=2.00<=2.00.07 |
The impacted product is end-of-life and should be disconnected if still in use.
DOPSoft 2 will not receive an update to mitigate these vulnerabilities because it is an end-of-life product. Delta Electronics recommends users to switch to the replacement software when available
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38406 is a vulnerability in Delta Electronics DOPSoft 2 (Version 2.00.07 and prior) that allows for improper input validation of user-supplied data when parsing specific project files.
The impact of CVE-2021-38406 is multiple out-of-bounds write instances, which could allow an attacker to execute code in the context of the current process.
CVE-2021-38406 has a severity rating of 7.8 (High).
Currently, there is no known fix for CVE-2021-38406. It is recommended to update to the latest version of Delta Electronics DOPSoft 2 when it becomes available.
You can find more information about CVE-2021-38406 on the following references: [CISA Advisory](https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-02) and [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02).