CVE-2023-43819
📋 TL;DR
A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft allows remote code execution when a user opens a malicious DPS file. This affects industrial automation systems using DOPSoft for HMI programming. Attackers can exploit this without authentication by tricking users into opening specially crafted files.
💻 Affected Systems
- Delta Electronics Delta Industrial Automation DOPSoft
📦 What is this software?
Dopsoft by Deltaww
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the workstation, potentially leading to disruption of industrial processes, data theft, or lateral movement into operational technology networks.
Likely Case
Remote code execution on the engineering workstation, allowing malware installation, credential theft, and potential access to connected industrial control systems.
If Mitigated
Limited to isolated engineering workstation compromise if proper network segmentation and least privilege are implemented.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). Public proof-of-concept demonstrates reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.00.16.11
Vendor Advisory: https://www.deltaww.com/en-US/Service/DownloadCenter
Restart Required: Yes
Instructions:
1. Download DOPSoft version 4.00.16.11 or later from Delta Electronics website. 2. Run the installer. 3. Follow installation prompts. 4. Restart the system after installation completes.
🔧 Temporary Workarounds
Restrict DPS file handling
allBlock DPS files at email gateways and web proxies to prevent delivery of malicious files.
Application whitelisting
windowsImplement application control to prevent unauthorized execution of DOPSoft or restrict it to specific users.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate engineering workstations from production networks
- Train users to never open DPS files from untrusted sources and implement file extension filtering
🔍 How to Verify
Check if Vulnerable:
Check DOPSoft version in Help > About. If version is earlier than 4.00.16.11, the system is vulnerable.
Check Version:
Not applicable - check via DOPSoft GUI Help > About
Verify Fix Applied:
Verify DOPSoft version shows 4.00.16.11 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing DOPSoft crashes, unexpected process creation from DOPSoft
Network Indicators:
- Unusual outbound connections from engineering workstations, especially to external IPs
SIEM Query:
Process Creation where Image contains 'dopsoft.exe' AND ParentImage contains 'explorer.exe'
🔗 References
- https://blog.exodusintel.com/2024/01/18/delta-electronics-delta-industrial-automation-dopsoft-dps-file-initialmacrolen-buffer-overflow-remote-code-execution/
- https://blog.exodusintel.com/2024/01/18/delta-electronics-delta-industrial-automation-dopsoft-dps-file-initialmacrolen-buffer-overflow-remote-code-execution/