Delta Electronics DIAView

Plan PatchCVSS 7.8ICS-CERT ICSA-26-022-07Jan 22, 2026
Delta Electronics
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

DIAView versions 4.2.0 and earlier contain an arbitrary code execution vulnerability (CWE-77) that can be triggered when a user opens or interacts with a malicious file. Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running DIAView.

What this means
What could happen
An attacker could execute arbitrary code on DIAView workstations, potentially giving them control over the HMI layer and the ability to alter process parameters or commands sent to industrial equipment.
Who's at risk
Water and electric utility operators, energy generation facilities, and other industrial process operators who use Delta Electronics DIAView for monitoring and control of manufacturing or critical infrastructure systems should prioritize this update.
How it could be exploited
An attacker delivers a malicious file (likely via email or a website link) to a DIAView user. When the user opens or interacts with the file, arbitrary code execution is triggered on the workstation running DIAView, giving the attacker the ability to run commands at the privilege level of the user or application.
Prerequisites
  • User interaction required (clicking a link or opening an attachment)
  • DIAView running on the workstation
  • User must be logged in to DIAView or the system
User interaction requiredAffects HMI/supervisory control workstationHigh severity CVSS scoreCode execution capability
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
DIAView: 4.2.04.2.04.4+
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDDo not click links or download attachments from untrusted email senders or websites
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate DIAView to version 4.4 or later
Long-term hardening
0/2
HARDENINGRestrict network access to DIAView workstations to only necessary engineering and operations staff
HARDENINGIsolate the DIAView network segment from the business network using a firewall
API: /api/v1/advisories/dfbf632c-8012-48fa-bc73-f1d903f91213

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Delta Electronics DIAView | CVSS 7.8 - OTPulse