Delta Electronics Fixes Vulnerability

Thursday, June 21, 2018 @ 06:06 PM gHale

Delta Electronics released new software to mitigate a stack-based buffer overflow in its Delta Industrial Automation COMMGR, according to a report with NCCIC.

Successful exploitation of this remotely exploitable vulnerability, reported by an anonymous researcher working with Trend Micro’s Zero Day Initiative, may allow remote code execution, cause the application to crash, or cause a denial-of-service condition in the application server.

RELATED STORIES
Rockwell Fixes CompactLogix, Compact GuardLogix Hole
Siemens Fixes SCALANCE, RUGGEDCOM, SIMATIC Flaw
Update for Natus Xltek NeuroWorks Hole
Schneider Fills U.motion Builder Holes

The following versions of Delta Industrial Automation COMMGR, a communication management software, and accompanying PLC simulators suffer from the issue:
• COMMGR Version 1.08 and prior.
• DVPSimulator EH2, EH3, ES2, SE, SS2
• AHSIM_5x0, AHSIM_5x1

In the vulnerability, the application utilizes a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the application server.

CVE-2018-10594 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.3.

The product sees use in the commercial facilities, communications, critical manufacturing, energy, and healthcare and public health sectors. It also sees action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

Taiwan-based Delta Electronics released COMMGR v1.09 to address this vulnerability and recommends users upgrade. Click here to download the updated version.

Delta Electronics also recommends affected users apply application whitelists to allow only trusted communications via Ports 502 and 10002.



Leave a Reply

You must be logged in to post a comment.