CWE
89
Advisory Published
Updated

CVE-2022-26887: Delta Electronics DIAEnergie SQL Injection in DIAE_HandlerTag_KID.ashx

First published: Tue Mar 29 2022(Updated: )

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_loopmapHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Deltaww Diaenergie<1.8.02.004
Delta Electronics DIAEnergie<1.9
1.9

Remedy

Delta Electronics has fixed the reported vulnerabilities in Version 1.08.02.004. Users should contact Delta customer service or a Delta representative for this release, as it will not be released publicly. Delta is working on a public release that will include these fixes and other features on June 30, 2022. Delta also suggests users: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from the business network. Use an application firewall that can detect attacks against “Path Traversal” and “SQL Injection” weakness. Never connect programming software to any network other than the network intended for that device. When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing a VPN is only as secure as its connected devices

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-26887?

    CVE-2022-26887 is a blind SQL injection vulnerability in Delta Electronics DIAEnergie, allowing an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

  • What is the severity of CVE-2022-26887?

    CVE-2022-26887 has a severity rating of 9.8, which is classified as critical.

  • How can an attacker exploit CVE-2022-26887?

    An attacker can exploit CVE-2022-26887 by injecting arbitrary SQL queries through the DIAE_loopmapHandler.ashx component, allowing them to retrieve and modify database contents and execute system commands.

  • Which versions of Delta Electronics DIAEnergie are affected by CVE-2022-26887?

    All versions of Delta Electronics DIAEnergie prior to 1.8.02.004 are affected by CVE-2022-26887.

  • Is there a fix available for CVE-2022-26887?

    Yes, upgrading to version 1.8.02.004 of Delta Electronics DIAEnergie will fix the CVE-2022-26887 vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203