First published: Mon Dec 04 2023(Updated: )
Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics has declared DOPSoft as end-of-life and recommends users to use DIAScreen instead. This vulnerability does not exist on the newest version of DIAScreen. Users may download the DIAScreen v1.3.1 (or newer) on the DIAStudio download center https://diastudio.deltaww.com/home/downloads
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5944 is a vulnerability in Delta Electronics DOPSoft that allows for a stack-based buffer overflow, potentially leading to arbitrary code execution.
CVE-2023-5944 allows an attacker to execute arbitrary code in Delta Electronics DOPSoft by exploiting a stack-based buffer overflow.
CVE-2023-5944 has a severity rating of 7.8 (high).
An attacker can exploit CVE-2023-5944 by convincing a legitimate user to execute a specially crafted file that triggers the stack-based buffer overflow in Delta Electronics DOPSoft.
To mitigate CVE-2023-5944, it is recommended to apply the latest security updates and patches provided by Delta Electronics and exercise caution when opening files from untrusted sources.