First published: Thu Feb 02 2023(Updated: )
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dopsoft | <4.00.16.22 |
Delta Electronics released version 1.3.0 of DIAScreen https://deltaiastudio.b2clogin.com/deltaiastudio.onmicrosoft.com/oauth2/v2.0/authorize (login required) and recommends users to use DIAScreen instead of DOPSoft.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0123 is a vulnerability in Delta Electronics DOPSoft versions 4.00.16.22 and prior that allows an attacker to remotely execute arbitrary code.
The severity of CVE-2023-0123 is high, with a severity value of 7.8.
An attacker can exploit CVE-2023-0123 by introducing a malformed file to the Delta Electronics DOPSoft software, which triggers a stack-based buffer overflow and allows remote code execution.
Delta Electronics DOPSoft versions 4.00.16.22 and prior are affected by CVE-2023-0123.
Currently, there is no known fix for CVE-2023-0123. It is recommended to apply any patches or updates provided by the vendor and follow best practices to mitigate the risk.