CVE-2020-27275

7.8 HIGH

📋 TL;DR

Delta Electronics DOPSoft versions 4.0.8.21 and earlier contain an out-of-bounds write vulnerability when processing project files, allowing attackers to execute arbitrary code on affected systems. This affects industrial control system operators using Delta HMI software for programming and configuration.

💻 Affected Systems

Products:
  • Delta Electronics DOPSoft
Versions: 4.0.8.21 and all prior versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of vulnerable DOPSoft versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the engineering workstation, potentially enabling lateral movement to industrial control systems.

🟠

Likely Case

Remote code execution on engineering workstations leading to data theft, manipulation of HMI programs, or disruption of industrial processes.

🟢

If Mitigated

Limited impact if systems are air-gapped, have strict file transfer controls, and use principle of least privilege.

🌐 Internet-Facing: MEDIUM - While the software itself isn't typically internet-facing, project files could be transferred from internet sources.
🏢 Internal Only: HIGH - Attackers with internal access could exploit via malicious project files or compromised engineering workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious project file. Multiple ZDI advisories suggest sophisticated exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8.22 or later

Vendor Advisory: https://www.deltaww.com/en-US/Service/DownloadCenter

Restart Required: Yes

Instructions:

1. Download DOPSoft version 4.0.8.22 or later from Delta Electronics website. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict project file sources

all

Only open project files from trusted sources and implement file integrity checking

Application whitelisting

windows

Implement application control to prevent execution of unauthorized code

Using Windows AppLocker or similar: New-AppLockerPolicy -RuleType Publisher,Path -User Everyone -Action Deny

🧯 If You Can't Patch

  • Air-gap engineering workstations from untrusted networks
  • Implement strict access controls and monitor for suspicious file activity

🔍 How to Verify

Check if Vulnerable:

Check DOPSoft version via Help > About in the application or examine installed programs in Windows Control Panel

Check Version:

wmic product where name="DOPSoft" get version

Verify Fix Applied:

Verify installed version is 4.0.8.22 or later and test opening known-good project files

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from DOPSoft.exe
  • Memory access violations in application logs
  • Unusual file operations from DOPSoft process

Network Indicators:

  • Unexpected outbound connections from engineering workstations
  • File transfers to/from DOPSoft directories

SIEM Query:

source="windows" process_name="DOPSoft.exe" AND (event_id=4688 OR event_id=4663)

🔗 References

📤 Share & Export