CVE-2024-47965

7.8 HIGH

📋 TL;DR

Delta Electronics CNCSoft-G2 has a buffer over-read vulnerability (CWE-125) that allows attackers to read memory beyond allocated buffers. This can lead to information disclosure or be combined with other vulnerabilities for code execution. Industrial control systems using CNCSoft-G2 for CNC machine programming and monitoring are affected.

💻 Affected Systems

Products:
  • Delta Electronics CNCSoft-G2
Versions: All versions prior to security patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the DOPSoft component within CNCSoft-G2 used for HMI screen development and programming.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full compromise of CNC systems, potential manipulation of manufacturing processes, production disruption, or safety incidents.

🟠

Likely Case

Information disclosure from memory, potential denial of service, or limited code execution within the CNCSoft-G2 process context.

🟢

If Mitigated

Limited impact with proper network segmentation and application sandboxing, potentially only information disclosure without code execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction (visiting malicious page/file) but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial networks often have less security monitoring, and users may have elevated privileges on CNC systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious file/website). Exploit would need to bypass ASLR/DEP protections for reliable code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Delta Electronics advisory for specific patched version

Vendor Advisory: https://www.deltaww.com/en-US/Services/DownloadCenter

Restart Required: Yes

Instructions:

1. Contact Delta Electronics support for latest security patches. 2. Download and install the patch. 3. Restart CNCSoft-G2 and affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict file execution

windows

Prevent execution of untrusted files in CNCSoft-G2 context

Application sandboxing

windows

Run CNCSoft-G2 with reduced privileges using application control solutions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CNC systems from business networks
  • Deploy application whitelisting to prevent unauthorized code execution on CNC workstations

🔍 How to Verify

Check if Vulnerable:

Check CNCSoft-G2 version against Delta Electronics security advisory. Vulnerable if using unpatched version.

Check Version:

Check version in CNCSoft-G2 About dialog or installation directory properties

Verify Fix Applied:

Verify installed version matches or exceeds patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected CNCSoft-G2 crashes
  • Memory access violation errors in Windows Event Logs
  • Unusual file access patterns from CNCSoft-G2 process

Network Indicators:

  • Unexpected network connections from CNC workstations
  • Traffic to/from CNC systems during non-operational hours

SIEM Query:

EventID=1000 OR EventID=1001 Source='Application Error' AND ProcessName='CNCSoft-G2.exe'

🔗 References

📤 Share & Export