Delta Electronics DOPSoft (Update A)
DOPSoft contains a buffer read vulnerability (CWE-125) that allows sensitive information to be disclosed when a malicious project file is opened. The vulnerability affects all versions of DOPSoft. Exploitation requires user interaction—an attacker must trick an engineering staff member into opening a crafted project file, likely via email or a compromised download source. This is not remotely exploitable and does not directly compromise running control systems. However, exposed information such as control logic, setpoints, or network configuration could be used in follow-up attacks against the facility's industrial systems.
- User must open a malicious DOPSoft project file from an untrusted source
- DOPSoft must be installed and used to open the file
- User interaction required (clicking to open or load a project)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8b0862f5-0710-4de1-afc9-74952fe05d10Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.