CVE-2023-43821

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft allows remote code execution when users open malicious DPS files. Attackers can exploit this without authentication by tricking users into opening specially crafted files. Organizations using Delta Industrial Automation DOPSoft for HMI programming are affected.

💻 Affected Systems

Products:
  • Delta Electronics Delta Industrial Automation DOPSoft
Versions: All versions prior to patched version (specific version unknown from provided references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing DPS project files containing malicious wLogTitlesActionLen field values.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the workstation, potentially leading to lateral movement within industrial control networks and disruption of manufacturing processes.

🟠

Likely Case

Attacker executes arbitrary code on the engineering workstation, potentially stealing credentials, installing malware, or disrupting HMI programming activities.

🟢

If Mitigated

Limited impact with proper segmentation and user awareness preventing successful exploitation attempts.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but the exploit itself is straightforward once the file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown from provided references - check Delta Electronics advisory

Vendor Advisory: Not provided in references - check Delta Electronics website

Restart Required: Yes

Instructions:

1. Check Delta Electronics security advisory for patch availability
2. Download and install the latest DOPSoft version
3. Restart the system after installation
4. Verify patch installation

🔧 Temporary Workarounds

Restrict DPS file handling

windows

Block or restrict DPS file extensions from being opened by DOPSoft

Use Group Policy or application whitelisting to block .dps files
Configure Windows to open .dps files with a different application

User awareness training

all

Train users to only open DPS files from trusted sources

🧯 If You Can't Patch

  • Segment DOPSoft workstations from critical networks using firewalls
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check DOPSoft version against patched version in vendor advisory

Check Version:

Check Help > About in DOPSoft application or examine installed programs in Windows Control Panel

Verify Fix Applied:

Verify DOPSoft version matches or exceeds patched version, test with known safe DPS files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of DOPSoft.exe
  • Unusual process creation from DOPSoft
  • Multiple failed file parsing attempts

Network Indicators:

  • Unexpected outbound connections from DOPSoft workstations
  • File transfers to/from engineering workstations

SIEM Query:

Process Creation where Image contains 'DOPSoft' AND ParentImage contains 'explorer' OR CommandLine contains '.dps'

🔗 References

📤 Share & Export