CVE-2021-32965

7.8 HIGH

📋 TL;DR

Delta Electronics DIAScreen versions prior to 1.1.0 contain a type confusion vulnerability that could allow remote attackers to execute arbitrary code on affected systems. This affects industrial control systems using vulnerable DIAScreen software for HMI/SCADA applications. Attackers could potentially gain control of industrial processes.

💻 Affected Systems

Products:
  • Delta Electronics DIAScreen
Versions: All versions prior to 1.1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Typically deployed in industrial control environments for HMI/SCADA applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to physical process manipulation, production disruption, safety system bypass, or environmental damage.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate sensitive industrial data, or disrupt HMI/SCADA operations.

🟢

If Mitigated

Limited impact if systems are air-gapped, properly segmented, and have strict access controls preventing external communication.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Type confusion vulnerabilities typically require specific knowledge of the software's memory layout and object structures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.0

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-21-208-05

Restart Required: Yes

Instructions:

1. Download DIAScreen version 1.1.0 from Delta Electronics
2. Backup current configuration and data
3. Install the updated version following vendor instructions
4. Restart the system
5. Verify successful installation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DIAScreen systems from untrusted networks and internet access

Firewall Restrictions

all

Implement strict firewall rules to limit inbound connections to DIAScreen systems

🧯 If You Can't Patch

  • Implement strict network segmentation and air-gap vulnerable systems from untrusted networks
  • Deploy application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check DIAScreen version in application interface or installation directory properties

Check Version:

Check application version through DIAScreen interface or Windows Program and Features

Verify Fix Applied:

Verify DIAScreen version shows 1.1.0 or higher in application properties

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from DIAScreen executable
  • Network connections from DIAScreen to unexpected destinations
  • Application crashes or unexpected behavior in DIAScreen

Network Indicators:

  • Unexpected network traffic to/from DIAScreen systems
  • Suspicious protocol usage targeting DIAScreen ports

SIEM Query:

Process creation where parent process contains 'DIAScreen' AND (process name contains 'cmd.exe' OR 'powershell.exe' OR 'wscript.exe')

🔗 References

📤 Share & Export