CVE-2023-1133

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Delta Electronics InfraSuite Device Master systems by sending malicious UDP packets to port 10100. The service deserializes untrusted data without validation, enabling remote code execution. All systems running InfraSuite Device Master versions before 1.0.5 are affected.

💻 Affected Systems

Products:
  • Delta Electronics InfraSuite Device Master
Versions: All versions prior to 1.0.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable service runs on UDP port 10100 by default with no authentication required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, pivot to other systems, disrupt industrial operations, or cause physical damage to connected equipment.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or disruption of industrial control systems.

🟢

If Mitigated

Limited impact if network segmentation prevents access to vulnerable systems, though successful exploitation still compromises the affected device.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available, and the attack requires no authentication, making exploitation trivial for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02

Restart Required: Yes

Instructions:

1. Download InfraSuite Device Master version 1.0.5 or later from Delta Electronics. 2. Backup current configuration. 3. Install the updated version. 4. Restart the system and verify the service is running correctly.

🔧 Temporary Workarounds

Block UDP port 10100

all

Block access to the vulnerable UDP port using network controls

Windows Firewall: New-NetFirewallRule -DisplayName "Block InfraSuite UDP" -Direction Inbound -Protocol UDP -LocalPort 10100 -Action Block
Linux iptables: iptables -A INPUT -p udp --dport 10100 -j DROP

Network segmentation

all

Isolate InfraSuite Device Master systems in separate network segments with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts on UDP port 10100

🔍 How to Verify

Check if Vulnerable:

Check if InfraSuite Device Master service is listening on UDP port 10100: netstat -an | findstr :10100 (Windows) or ss -ulpn | grep :10100 (Linux)

Check Version:

Check application version in the InfraSuite Device Master interface or installation directory

Verify Fix Applied:

Verify version is 1.0.5 or later and that the service no longer deserializes untrusted UDP packets

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Device-status service
  • Abnormal network connections from InfraSuite Device Master

Network Indicators:

  • UDP traffic to port 10100 from unexpected sources
  • Malformed UDP packets to port 10100

SIEM Query:

source_port:10100 AND protocol:UDP AND (payload_contains:"serialized" OR size > 1024)

🔗 References

📤 Share & Export