CVE-2024-10456
📋 TL;DR
Delta Electronics InfraSuite Device Master versions before 1.0.12 have a deserialization vulnerability in the Device-Gateway component that allows unauthenticated attackers to execute arbitrary .NET code. This affects industrial control systems using this software for device management. The vulnerability is critical due to its pre-authentication nature and high CVSS score.
💻 Affected Systems
- Delta Electronics InfraSuite Device Master
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution, enabling attackers to disrupt industrial operations, steal sensitive data, or deploy ransomware on critical infrastructure.
Likely Case
Remote code execution leading to unauthorized access, data exfiltration, or lateral movement within industrial networks.
If Mitigated
Limited impact if systems are isolated, patched, or have network segmentation preventing external access.
🎯 Exploit Status
The vulnerability allows exploitation without authentication, making it easier for attackers. No public proof-of-concept has been disclosed as of the advisory date.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.12
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-303-03
Restart Required: Yes
Instructions:
1. Download version 1.0.12 from Delta Electronics. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the Device Master service. 5. Verify the update was successful.
🔧 Temporary Workarounds
Network Segmentation
allIsolate InfraSuite Device Master systems from untrusted networks and the internet.
Firewall Rules
allRestrict network access to Device-Gateway ports (typically TCP 10100-10199) to trusted IPs only.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable systems from untrusted networks.
- Deploy intrusion detection systems to monitor for exploitation attempts and anomalous behavior.
🔍 How to Verify
Check if Vulnerable:
Check the software version in the Device Master interface or installation directory. Versions below 1.0.12 are vulnerable.
Check Version:
Check the application's About section or installed program details in Windows.
Verify Fix Applied:
Confirm the software version is 1.0.12 or higher in the application interface or via the installed files.
📡 Detection & Monitoring
Log Indicators:
- Unusual .NET deserialization errors in application logs
- Unexpected process creation from Device-Gateway service
- Authentication bypass attempts
Network Indicators:
- Suspicious traffic to Device-Gateway ports (10100-10199) from untrusted sources
- Anomalous outbound connections from the Device Master system
SIEM Query:
source="DeviceMaster" AND (event_type="deserialization_error" OR process_name="powershell.exe" OR cmdline="*Invoke-Expression*")