CVE-2023-1144

8.8 HIGH

📋 TL;DR

Delta Electronics InfraSuite Device Master versions before 1.0.5 contain an improper access control vulnerability in the Device-Gateway service. Attackers can bypass authorization mechanisms to escalate privileges, potentially gaining unauthorized control over industrial control systems. This affects organizations using Delta's InfraSuite Device Master for industrial automation.

💻 Affected Systems

Products:
  • Delta Electronics InfraSuite Device Master
Versions: All versions prior to 1.0.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Device-Gateway service component of InfraSuite Device Master.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, allowing attackers to manipulate critical infrastructure operations, cause physical damage, or disrupt essential services.

🟠

Likely Case

Unauthorized access to industrial control systems enabling data theft, operational disruption, or installation of persistent malware.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the Device-Gateway service but bypasses authorization controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02

Restart Required: Yes

Instructions:

1. Download InfraSuite Device Master version 1.0.5 or later from Delta Electronics. 2. Backup current configuration. 3. Install the updated version following vendor instructions. 4. Restart the Device-Gateway service. 5. Verify proper functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate InfraSuite Device Master systems from untrusted networks using firewalls and VLANs.

Service Access Restriction

all

Configure firewall rules to restrict access to Device-Gateway service ports to authorized IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts against Device-Gateway service

🔍 How to Verify

Check if Vulnerable:

Check the installed version of InfraSuite Device Master in the application interface or installation directory.

Check Version:

Check application interface or consult vendor documentation for version verification method.

Verify Fix Applied:

Confirm version is 1.0.5 or later and test authorization controls for Device-Gateway service.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Device-Gateway service
  • Privilege escalation events in application logs
  • Unusual authentication patterns

Network Indicators:

  • Unexpected connections to Device-Gateway service ports
  • Traffic patterns indicating authorization bypass attempts

SIEM Query:

source="InfraSuite" AND (event_type="auth_failure" OR event_type="privilege_escalation")

🔗 References

📤 Share & Export