Virtual Event Now Live: Zero Trust Strategies Summit! - Login for Access
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Delta Electronics Patches Serious Flaws in Industrial Networking Devices

Taiwan-based Delta Electronics has patched potentially serious vulnerabilities in two of its industrial networking products.

The flaws were identified by researchers at CyberDanube, a new industrial cybersecurity company based in Austria, in Delta’s DX-2100-L1-CN 3G cloud router and the DVW-W02W2-E2 industrial wireless access point.

Taiwan-based Delta Electronics has patched potentially serious vulnerabilities in two of its industrial networking products.

The flaws were identified by researchers at CyberDanube, a new industrial cybersecurity company based in Austria, in Delta’s DX-2100-L1-CN 3G cloud router and the DVW-W02W2-E2 industrial wireless access point.

Delta Electronics router vulnerability The researchers conducted their analysis on so-called digital twins, which involve virtualization techniques, rather than by looking at the actual devices.

In the 3G router, they discovered an authenticated command injection issue and a stored cross-site scripting (XSS) flaw. The command injection vulnerability can allow an attacker who has credentials for the web service to execute system commands on the OS with root privileges.

While exploitation of the security hole requires authentication, CyberDanube founder and technical director Thomas Weber told SecurityWeek that the XSS vulnerability could be leveraged by an attacker to bypass the authentication requirement.

In the case of the Delta access point, CyberDanube researchers discovered an authenticated command injection vulnerability.

“[The vulnerability] allows an attacker to gain full access to the underlying operating system of the device with all implications. If such a device is acting as a key device in an industrial network, or controls various critical equipment via serial ports, more extensive damage in the corresponding network can be done by an attacker,” CyberDanube said in an advisory published on Wednesday.

Weber explained that in the case of this vulnerability an attacker could obtain the credentials required for exploitation by doing ARP spoofing on the network or thorough brute-force attacks, noting that the difficulty of obtaining the credentials generally depends on the strength of the password.

The vulnerabilities, both rated ‘high impact’ by CyberDanube, were reported to the vendor in August and firmware patches were released in November. The cybersecurity firm has released advisories with technical details for both products (DX-2100-L1-CN and DVW-W02W2-E2).

Advertisement. Scroll to continue reading.

Vulnerabilities affecting products from Delta Electronics should not be ignored. In August, the US Cybersecurity and Infrastructure Security Agency (CISA) warned that a flaw affecting industrial automation software made by the company had been exploited in attacks.

Related: Many Critical Flaws Patched in Delta Electronics Energy Management System

Related: Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files

Related: Exploitation of Flaws in Delta Energy Management System Could Have ‘Dire Consequences’

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

Omkhar Arasaratnam, former GM at OpenSSF, is LinkedIn's first Distinguised Security Engineer

Defense contractor Nightwing has appointed Tricia Fitzmaurice as Chief Growth Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.