CVE-2020-27293

7.8 HIGH

📋 TL;DR

This vulnerability in Delta Electronics CNCSoft-B allows attackers to execute arbitrary code by exploiting a type confusion issue when processing malicious project files. It affects industrial control systems using CNCSoft-B version 1.0.0.2 and earlier. Attackers could gain control of CNC machines and manufacturing equipment.

💻 Affected Systems

Products:
  • Delta Electronics CNCSoft-B
Versions: 1.0.0.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects industrial control systems in manufacturing environments. Requires processing of malicious project files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of CNC machines leading to physical damage, production disruption, or safety incidents through arbitrary code execution.

🟠

Likely Case

Unauthorized access to CNC systems allowing data theft, manipulation of manufacturing processes, or ransomware deployment.

🟢

If Mitigated

Limited impact through network segmentation and proper access controls preventing project file uploads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering or existing access to upload malicious project files. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.0.0.3 or later

Vendor Advisory: https://www.deltaww.com/en-US/Support/Downloads/Detail?code=CNCSoft-B

Restart Required: Yes

Instructions:

1. Download latest version from Delta Electronics support portal. 2. Uninstall current CNCSoft-B. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict Project File Processing

windows

Limit who can load project files and from which locations

Implement Windows file permissions to restrict .proj file access
Configure application whitelisting to control execution

Network Segmentation

all

Isolate CNC systems from general network traffic

Configure firewall rules to block unnecessary inbound/outbound traffic
Implement VLAN segmentation for OT networks

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized project file uploads
  • Monitor for suspicious file processing activities and network connections

🔍 How to Verify

Check if Vulnerable:

Check CNCSoft-B version in Help > About menu. If version is 1.0.0.2 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 1.0.0.3 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual project file loading from unexpected locations
  • Multiple failed project file parsing attempts
  • Unexpected process creation from CNCSoft-B

Network Indicators:

  • Unexpected outbound connections from CNC systems
  • File transfers to/from CNC systems outside normal patterns

SIEM Query:

source="CNCSoft-B" AND (event="FileLoad" OR event="ProcessCreate") | where file_path contains ".proj"

🔗 References

📤 Share & Export