CVE-2024-47963

7.8 HIGH

📋 TL;DR

Delta Electronics CNCSoft-G2 has a memory corruption vulnerability where improper validation of user-supplied data allows writing past allocated object boundaries. Attackers can exploit this by tricking users into opening malicious files or visiting malicious pages, potentially executing arbitrary code with the privileges of the current process. This affects industrial control systems using vulnerable versions of CNCSoft-G2 software.

💻 Affected Systems

Products:
  • Delta Electronics CNCSoft-G2
Versions: All versions prior to 1.1.0.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects CNC programming and simulation software used in industrial control environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to disruption of industrial operations, data theft, or manipulation of CNC machinery.

🟠

Likely Case

Local privilege escalation or code execution on systems where users open malicious files, potentially disrupting manufacturing processes.

🟢

If Mitigated

Limited impact with proper network segmentation, user awareness training, and restricted file execution policies.

🌐 Internet-Facing: MEDIUM - Requires user interaction with malicious content but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial networks often have less security monitoring, and users may inadvertently open malicious files from internal sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious files or visit malicious pages. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.1.0.5

Vendor Advisory: https://www.deltaww.com/en-US/Support/Downloads/Detail?code=CNCSoft-G2

Restart Required: Yes

Instructions:

1. Download CNCSoft-G2 version 1.1.0.5 from Delta Electronics support portal. 2. Close all CNCSoft-G2 applications. 3. Run the installer with administrative privileges. 4. Follow installation prompts. 5. Restart the system.

🔧 Temporary Workarounds

Restrict file execution

windows

Implement application whitelisting to prevent execution of unauthorized files.

Using Windows AppLocker or similar tools to restrict CNCSoft-G2 to only open trusted file types

Network segmentation

all

Isolate CNC systems from general business networks and internet access.

Configure firewall rules to restrict CNCSoft-G2 network traffic to necessary industrial protocols only

🧯 If You Can't Patch

  • Implement strict user awareness training about opening files from untrusted sources.
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious process behavior.

🔍 How to Verify

Check if Vulnerable:

Check CNCSoft-G2 version in Help > About menu. Versions below 1.1.0.5 are vulnerable.

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

Confirm version shows 1.1.0.5 or higher in Help > About menu after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of CNCSoft-G2
  • Suspicious file access patterns from CNCSoft-G2 process

Network Indicators:

  • Unusual outbound connections from CNC systems
  • File downloads to CNC systems from untrusted sources

SIEM Query:

Process:cncsoft.exe AND (EventID:1000 OR EventID:1001) OR FileCreation:(*.dop OR *.nc) FROM untrusted_source

🔗 References

📤 Share & Export