CVE-2025-47728

7.3 HIGH

📋 TL;DR

Delta Electronics CNCSoft-G2 has a memory corruption vulnerability due to improper file validation. Attackers can execute arbitrary code by tricking users into opening malicious files. This affects all users of CNCSoft-G2 software for industrial control systems.

💻 Affected Systems

Products:
  • Delta Electronics CNCSoft-G2
Versions: All versions prior to the patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects engineering workstations running CNCSoft-G2 software for CNC machine programming and monitoring.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code with current process privileges, potentially leading to industrial process disruption, data theft, or lateral movement within OT networks.

🟠

Likely Case

Local privilege escalation or malware execution on the engineering workstation, potentially affecting connected CNC machines and manufacturing processes.

🟢

If Mitigated

Limited impact if proper network segmentation and user privilege restrictions are in place, though file execution could still occur.

🌐 Internet-Facing: LOW - This requires user interaction to open malicious files, typically not directly internet-exposed.
🏢 Internal Only: HIGH - Industrial control systems often have privileged access and direct connections to manufacturing equipment, making internal exploitation particularly dangerous.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to get user to open malicious file. Memory corruption vulnerabilities can be complex to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Delta Electronics advisory PCSA-2025-00007

Vendor Advisory: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00007_CNCSoft-G2%20-%20File%20Parsing%20Memory%20Corruption.pdf

Restart Required: Yes

Instructions:

1. Download the patch from Delta Electronics support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict file execution

windows

Implement application whitelisting to prevent execution of unauthorized files

Use Windows AppLocker or similar to restrict CNCSoft-G2 file execution

User training and file validation

all

Train users to only open trusted files and implement file validation procedures

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CNC engineering workstations from other networks
  • Apply principle of least privilege - restrict user accounts to only necessary permissions for CNCSoft-G2 operation

🔍 How to Verify

Check if Vulnerable:

Check CNCSoft-G2 version against patched version in vendor advisory. Review system logs for unexpected file parsing errors.

Check Version:

Check version in CNCSoft-G2 application interface or installation directory properties

Verify Fix Applied:

Verify installed version matches patched version from vendor advisory. Test file parsing functionality with known safe files.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file parsing errors in application logs
  • Memory access violation events in Windows Event Logs
  • Unusual process creation from CNCSoft-G2

Network Indicators:

  • Unexpected file transfers to CNC engineering workstations
  • Suspicious network connections from CNCSoft-G2 process

SIEM Query:

Process Creation where Parent Process contains 'CNCSoft' AND Command Line contains file extension patterns (.cnc, .nc, etc.)

🔗 References

📤 Share & Export