Delta Electronics DIAScreen
Plan Patch7.8ICS-CERT ICSA-24-312-02Nov 7, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
DIAScreen contains a buffer overflow condition (CWE-121) that could crash the device or allow code execution. The vulnerability requires local access and user interaction to trigger. Delta Electronics has released version 1.5.0 to address this issue. No public exploitation has been reported, and these vulnerabilities are not remotely exploitable.
What this means
What could happen
A buffer overflow in DIAScreen could allow an attacker with local access to crash the device or execute arbitrary commands, potentially disrupting SCADA visualization and monitoring of your control systems.
Who's at risk
Water authorities and electric utilities using Delta Electronics DIAScreen for SCADA visualization and process monitoring. Any control system operator workstation or engineering station running the affected software is at risk.
How it could be exploited
An attacker with local access to a machine running DIAScreen could trigger a buffer overflow through a crafted input or interaction with the application. This could lead to code execution on that workstation, giving the attacker control over the visualization and monitoring interface.
Prerequisites
- Local access to a workstation or server running DIAScreen
- User interaction (clicking a link or opening a file)
- DIAScreen version below v1.5.0
buffer overflow vulnerabilitylocal access requireduser interaction requiredaffects visualization/monitoring interface
Exploitability
Moderate exploit probability (EPSS 2.0%)
Affected products (1)
ProductAffected VersionsFix Status
DIAScreen: <v1.5.0<v1.5.0v1.5.0
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDEducate staff not to click unsolicited web links or open attachments from unknown senders that could trigger the vulnerability
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate DIAScreen to version 1.5.0 or later
Long-term hardening
0/1HARDENINGRestrict physical and network access to systems running DIAScreen to authorized personnel only
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/762e2fb1-89fb-490e-865b-33ac1e4090e8