CVE-2023-43817

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in Delta Electronics DOPSoft version 2 allows remote code execution when parsing malicious DPS files. Attackers can exploit this by tricking users into opening specially crafted files. This affects industrial automation systems using vulnerable DOPSoft software.

💻 Affected Systems

Products:
  • Delta Electronics Delta Industrial Automation DOPSoft
Versions: Version 2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where DOPSoft is installed and used to open DPS files. Typically found on engineering workstations in industrial environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the workstation running DOPSoft, potentially leading to industrial process disruption or lateral movement into OT networks.

🟠

Likely Case

Attacker executes arbitrary code on the engineering workstation, potentially stealing credentials, modifying PLC programs, or establishing persistence in the industrial network.

🟢

If Mitigated

Limited impact with proper network segmentation and user awareness preventing malicious file execution.

🌐 Internet-Facing: LOW - DOPSoft is typically not internet-facing, but could be exposed through remote access solutions.
🏢 Internal Only: HIGH - Attackers with internal access or who can phish users can exploit this vulnerability to compromise engineering workstations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to open malicious DPS file. Technical details and proof-of-concept are publicly available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found at time of analysis

Restart Required: No

Instructions:

Check Delta Electronics website for security updates. If patch is available, download and install following vendor instructions. Consider upgrading to newer supported versions if available.

🔧 Temporary Workarounds

Restrict DPS file handling

windows

Configure Windows to open DPS files with a text editor instead of DOPSoft, or block DPS file execution entirely.

Use Windows Group Policy or registry to modify file associations for .dps extension

Application whitelisting

windows

Implement application control to prevent unauthorized execution of DOPSoft or restrict it to specific users.

Configure Windows AppLocker or similar solution to control DOPSoft execution

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate engineering workstations from general corporate network
  • Train users to never open DPS files from untrusted sources and implement email filtering for suspicious attachments

🔍 How to Verify

Check if Vulnerable:

Check DOPSoft version in Help > About menu. If version 2.x, system is likely vulnerable.

Check Version:

Open DOPSoft, navigate to Help > About menu to view version information

Verify Fix Applied:

Verify DOPSoft has been updated to a version not listed as vulnerable, or that workarounds have been properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DOPSoft crashes, unexpected process creation from DOPSoft, or suspicious file access patterns

Network Indicators:

  • Unusual network connections originating from engineering workstations running DOPSoft

SIEM Query:

Process creation where parent_process contains 'dopsoft.exe' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe' OR process_name contains suspicious executable names)

🔗 References

📤 Share & Export