CVE-2025-4124
📋 TL;DR
Delta Electronics ISPSoft version 3.20 contains an out-of-bounds write vulnerability when parsing ISP files. This allows attackers to execute arbitrary code on systems running the vulnerable software. Organizations using Delta Electronics industrial control systems with ISPSoft are affected.
💻 Affected Systems
- Delta Electronics ISPSoft
📦 What is this software?
Ispsoft by Deltaww
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code with the privileges of the ISPSoft process, potentially leading to industrial process disruption, data theft, or lateral movement within OT networks.
Likely Case
Local attacker with access to ISPSoft could craft malicious ISP files to gain code execution, potentially compromising the engineering workstation and gaining foothold in industrial control networks.
If Mitigated
With proper network segmentation and least privilege, impact limited to isolated engineering workstation without affecting production systems.
🎯 Exploit Status
Exploitation requires attacker to craft malicious ISP file and convince user to open it in ISPSoft. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.21 or later
Vendor Advisory: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00004_ISPSoft%20-%20Multiple%20Vulnerabilities_v2.pdf
Restart Required: Yes
Instructions:
1. Download ISPSoft version 3.21 or later from Delta Electronics website. 2. Uninstall current version. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict ISP file handling
windowsConfigure Windows to open ISP files with alternative application or require verification before opening
Application whitelisting
windowsImplement application control to prevent execution of unauthorized code
🧯 If You Can't Patch
- Segment engineering workstations from production networks using firewalls
- Implement strict file validation procedures for all ISP files before opening in ISPSoft
🔍 How to Verify
Check if Vulnerable:
Check ISPSoft version via Help > About in application menu. Version 3.20 is vulnerable.
Check Version:
Not applicable - check via application GUI
Verify Fix Applied:
Verify installed version is 3.21 or later via Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Unexpected crashes of ISPSoft.exe
- Creation of suspicious ISP files
- Unusual process execution from ISPSoft context
Network Indicators:
- Unexpected network connections from engineering workstations
- File transfers of ISP files to/from untrusted sources
SIEM Query:
Process:ispsoft.exe AND (EventID:1000 OR EventID:1001) OR FileCreation:*.isp FROM untrusted_source