CVE-2024-10456

9.8 CRITICAL

📋 TL;DR

Delta Electronics InfraSuite Device Master versions before 1.0.12 have a deserialization vulnerability in the Device-Gateway component that allows unauthenticated attackers to execute arbitrary .NET code. This affects industrial control systems using this software for device management. The vulnerability is critical due to its pre-authentication nature and high CVSS score.

💻 Affected Systems

Products:
  • Delta Electronics InfraSuite Device Master
Versions: All versions prior to 1.0.12
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Device-Gateway component specifically. Industrial control systems using this software are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, enabling attackers to disrupt industrial operations, steal sensitive data, or deploy ransomware on critical infrastructure.

🟠

Likely Case

Remote code execution leading to unauthorized access, data exfiltration, or lateral movement within industrial networks.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network segmentation preventing external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows exploitation without authentication, making it easier for attackers. No public proof-of-concept has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.12

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-303-03

Restart Required: Yes

Instructions:

1. Download version 1.0.12 from Delta Electronics. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the Device Master service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate InfraSuite Device Master systems from untrusted networks and the internet.

Firewall Rules

all

Restrict network access to Device-Gateway ports (typically TCP 10100-10199) to trusted IPs only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks.
  • Deploy intrusion detection systems to monitor for exploitation attempts and anomalous behavior.

🔍 How to Verify

Check if Vulnerable:

Check the software version in the Device Master interface or installation directory. Versions below 1.0.12 are vulnerable.

Check Version:

Check the application's About section or installed program details in Windows.

Verify Fix Applied:

Confirm the software version is 1.0.12 or higher in the application interface or via the installed files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .NET deserialization errors in application logs
  • Unexpected process creation from Device-Gateway service
  • Authentication bypass attempts

Network Indicators:

  • Suspicious traffic to Device-Gateway ports (10100-10199) from untrusted sources
  • Anomalous outbound connections from the Device Master system

SIEM Query:

source="DeviceMaster" AND (event_type="deserialization_error" OR process_name="powershell.exe" OR cmdline="*Invoke-Expression*")

🔗 References

📤 Share & Export