CVE-2021-43982

7.8 HIGH

📋 TL;DR

Delta Electronics CNCSoft versions 1.01.30 and earlier contain a stack-based buffer overflow vulnerability that could allow remote attackers to execute arbitrary code on affected systems. This affects industrial control systems using CNCSoft for CNC machine programming and monitoring. Attackers could potentially take full control of vulnerable systems.

💻 Affected Systems

Products:
  • Delta Electronics CNCSoft
Versions: Versions 1.01.30 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects CNCSoft-G2 and DOPSoft software used for programming and monitoring CNC machines in industrial environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code, disrupt manufacturing operations, manipulate CNC machines, and pivot to other industrial control systems.

🟠

Likely Case

Remote code execution leading to production disruption, data theft, or ransomware deployment on industrial control networks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only denial of service if exploit fails.

🌐 Internet-Facing: HIGH if CNCSoft systems are directly exposed to the internet, as the vulnerability can be exploited remotely.
🏢 Internal Only: HIGH as industrial control networks often have flat architectures allowing lateral movement once initial access is gained.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA advisory indicates active exploitation is possible. The buffer overflow can be triggered remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.01.31 or later

Vendor Advisory: https://www.deltaww.com/en-US/Support/Downloads/Detail?code=CNCSoft-G2

Restart Required: Yes

Instructions:

1. Download CNCSoft-G2 version 1.01.31 or later from Delta Electronics website. 2. Backup existing configurations. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate CNCSoft systems from untrusted networks and implement strict firewall rules.

Application Whitelisting

windows

Implement application control to prevent unauthorized code execution.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CNCSoft systems from other networks
  • Deploy intrusion detection systems and monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check CNCSoft version in Help > About menu. If version is 1.01.30 or earlier, system is vulnerable.

Check Version:

Check Help > About in CNCSoft application interface

Verify Fix Applied:

Verify version is 1.01.31 or later in Help > About menu and test functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from CNCSoft.exe
  • Memory access violations in application logs
  • Unexpected network connections from CNCSoft system

Network Indicators:

  • Unusual traffic to CNCSoft default ports
  • Malformed packets targeting CNCSoft services
  • Traffic from unexpected sources to industrial control systems

SIEM Query:

source="CNCSoft" AND (event_type="crash" OR process_name="cmd.exe" OR parent_process="CNCSoft.exe")

🔗 References

📤 Share & Export