CVE-2025-4124

7.8 HIGH

📋 TL;DR

Delta Electronics ISPSoft version 3.20 contains an out-of-bounds write vulnerability when parsing ISP files. This allows attackers to execute arbitrary code on systems running the vulnerable software. Organizations using Delta Electronics industrial control systems with ISPSoft are affected.

💻 Affected Systems

Products:
  • Delta Electronics ISPSoft
Versions: Version 3.20
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: ISPSoft is engineering software used for programming Delta PLCs. Vulnerable when parsing malicious ISP project files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code with the privileges of the ISPSoft process, potentially leading to industrial process disruption, data theft, or lateral movement within OT networks.

🟠

Likely Case

Local attacker with access to ISPSoft could craft malicious ISP files to gain code execution, potentially compromising the engineering workstation and gaining foothold in industrial control networks.

🟢

If Mitigated

With proper network segmentation and least privilege, impact limited to isolated engineering workstation without affecting production systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires attacker to craft malicious ISP file and convince user to open it in ISPSoft. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.21 or later

Vendor Advisory: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00004_ISPSoft%20-%20Multiple%20Vulnerabilities_v2.pdf

Restart Required: Yes

Instructions:

1. Download ISPSoft version 3.21 or later from Delta Electronics website. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict ISP file handling

windows

Configure Windows to open ISP files with alternative application or require verification before opening

Application whitelisting

windows

Implement application control to prevent execution of unauthorized code

🧯 If You Can't Patch

  • Segment engineering workstations from production networks using firewalls
  • Implement strict file validation procedures for all ISP files before opening in ISPSoft

🔍 How to Verify

Check if Vulnerable:

Check ISPSoft version via Help > About in application menu. Version 3.20 is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify installed version is 3.21 or later via Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of ISPSoft.exe
  • Creation of suspicious ISP files
  • Unusual process execution from ISPSoft context

Network Indicators:

  • Unexpected network connections from engineering workstations
  • File transfers of ISP files to/from untrusted sources

SIEM Query:

Process:ispsoft.exe AND (EventID:1000 OR EventID:1001) OR FileCreation:*.isp FROM untrusted_source

🔗 References

📤 Share & Export