CVE-2022-1402

7.8 HIGH

📋 TL;DR

CVE-2022-1402 is an out-of-bounds read vulnerability in ASDA-Soft versions 5.4.1.0 and earlier. Attackers can exploit this by tricking users into opening a malicious project file, potentially leading to information disclosure or application crashes. This affects industrial control systems using vulnerable ASDA-Soft software.

💻 Affected Systems

Products:
  • ASDA-Soft
Versions: 5.4.1.0 and prior versions
Operating Systems: Windows (typically used in industrial control environments)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects industrial control systems using ASDA-Soft for automation projects. Requires user to open malicious project file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or disruption of industrial processes.

🟠

Likely Case

Application crash causing denial of service in industrial control environments, potentially disrupting operations.

🟢

If Mitigated

Limited impact with proper network segmentation and user awareness training about opening untrusted files.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not direct network access.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or malicious files on shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to get user to open malicious project file. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.4.2.0 or later

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-111-01

Restart Required: Yes

Instructions:

1. Download ASDA-Soft version 5.4.2.0 or later from official vendor sources. 2. Backup existing projects. 3. Uninstall current version. 4. Install updated version. 5. Restart system. 6. Verify version with Help > About.

🔧 Temporary Workarounds

Restrict Project File Execution

windows

Implement application whitelisting to prevent execution of untrusted project files.

Using Windows AppLocker or similar: Create rule to only allow ASDA-Soft from trusted locations

User Awareness Training

all

Train users to only open project files from trusted sources and verify file integrity.

🧯 If You Can't Patch

  • Implement network segmentation to isolate ASDA-Soft systems from untrusted networks
  • Use application sandboxing or virtualization to contain potential exploitation

🔍 How to Verify

Check if Vulnerable:

Open ASDA-Soft, go to Help > About and check if version is 5.4.1.0 or earlier.

Check Version:

In ASDA-Soft GUI: Help > About

Verify Fix Applied:

After update, verify version is 5.4.2.0 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected project file openings from unusual locations

Network Indicators:

  • Unusual outbound connections from ASDA-Soft systems
  • File transfers containing project files

SIEM Query:

EventID=1000 OR EventID=1001 Source=ASDA-Soft.exe AND (ExceptionCode=0xc0000005 OR ExceptionCode=0xc0000409)

🔗 References

📤 Share & Export