OTPulse

Delta Electronics DIAScreen

Plan Patch7.8ICS-CERT ICSA-21-208-05Jul 27, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Delta Electronics DIAScreen (all versions before 1.1.0) contains a type confusion vulnerability (CWE-843) that could allow an attacker with local network access to crash the device or execute code through user interaction. No public exploits are currently known, and the vulnerability is not remotely exploitable from the Internet.

What this means
What could happen
An attacker with local access to a DIAScreen device could execute code on it or crash it, potentially disrupting industrial visualization and monitoring functions that operators depend on to view process status.
Who's at risk
Water utilities, electric utilities, and industrial manufacturers using Delta Electronics DIAScreen for process visualization and monitoring. This includes HMI/SCADA visualization consoles, control room displays, and engineering workstations running DIAScreen software.
How it could be exploited
An attacker with physical or local network access to a DIAScreen device could exploit a type confusion vulnerability (CWE-843) through user interaction (e.g., opening a malicious file or clicking a crafted link) to achieve code execution or denial of service on the device.
Prerequisites
  • Local or adjacent network access to the DIAScreen device
  • User interaction required (clicking, opening file, or similar action)
  • No elevated credentials needed
Local/adjacent exploitation requiredUser interaction requiredRequires elevated privileges to develop exploit (type confusion complexity)Visualization system impact—loss of operator situational awareness
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
DIAScreen: All< 1.1.01.1.0
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict network access to DIAScreen to authorized engineering and operations staff only; use firewall rules to limit connectivity
WORKAROUNDEducate operators and engineers not to open untrusted files or click suspicious links on DIAScreen devices
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate DIAScreen to Version 1.1.0 or later
Long-term hardening
0/1
HARDENINGIsolate DIAScreen and all visualization systems from the business network and Internet using network segmentation or air-gapping
↑↓ Navigate · Esc Close
API: /api/v1/advisories/17594446-98e2-41a8-9092-3c0f13a08ffb