OTPulse

Delta Electronics DIAScreen

Plan Patch7.8ICS-CERT ICSA-24-219-01Aug 6, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

DIAScreen versions prior to 1.4.2 contain a stack-based buffer overflow vulnerability (CWE-121) that could allow arbitrary code execution. The vulnerability requires local access to a workstation running DIAScreen and user interaction to trigger. It is not remotely exploitable. Delta Electronics has released version 1.4.2 to address this issue.

What this means
What could happen
A stack-based buffer overflow in DIAScreen could allow an attacker with local access to execute arbitrary code on the device, potentially compromising control system integrity or availability.
Who's at risk
This affects any organization using Delta Electronics DIAScreen software for configuring or monitoring Delta control systems, particularly those in water treatment, wastewater, or electric utility operations where DIAScreen is used to manage PLCs, VFDs, or other industrial equipment.
How it could be exploited
An attacker with local access to a workstation running DIAScreen could trigger a stack-based buffer overflow through a maliciously crafted input or file. This could overwrite memory and allow execution of arbitrary code on that workstation, potentially affecting control system operations if DIAScreen is used for configuration or monitoring of safety-critical devices.
Prerequisites
  • Local access to a workstation running DIAScreen
  • User interaction required (opening file or providing input that triggers the overflow)
Stack-based buffer overflow (memory corruption)Arbitrary code execution possibleRequires user interaction or local accessLow exploit probability (0.2% EPSS)
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
DIAScreen: <1.4.2<1.4.21.4.2
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict local access to workstations running DIAScreen; limit to authorized engineering and maintenance staff only
HARDENINGIsolate DIAScreen workstations from the internet and business networks; ensure they are behind a firewall with strict access controls
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate DIAScreen to version 1.4.2 or later
Long-term hardening
0/1
HARDENINGImplement user awareness training to avoid opening untrusted files or providing suspicious input to DIAScreen
↑↓ Navigate · Esc Close
API: /api/v1/advisories/6839e5a7-d326-4ed3-b63a-07ef6e3601d1