ID

VAR-202101-0358


CVE

CVE-2020-27277


TITLE

Delta Electronics Made HMI Multiple vulnerabilities in software

Trust: 0.8

sources: JVNDB: JVNDB-2021-001001

DESCRIPTION

Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code. Delta Electronics Provides HMI Related product DOPSoft and CNCSoft ScreenEditor The following multiple vulnerabilities exist in. DOPSoft ‥ * Out-of-bounds writing (CWE-787) - CVE-2020-27275 ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27277 CNCSoft ScreenEditor ‥ * Buffer overflow (CWE-121) - CVE-2020-27281Both vulnerabilities could allow arbitrary code to be executed by processing a specially crafted project file. This vulnerability allows remote atackers to execute arbitrary code on affected installations of Delta Industrial Automation DOPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of XLS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. DOPSoft is a human-machine interface (HMI) programming software launched by Delta Electronics

Trust: 2.88

sources: NVD: CVE-2020-27277 // JVNDB: JVNDB-2021-001001 // ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // VULMON: CVE-2020-27277

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-04429

AFFECTED PRODUCTS

vendor:deltawwmodel:dopsoftscope:lteversion:4.0.8.21

Trust: 1.0

vendor:deltamodel:cncsoft screeneditorscope:eqversion:version 1.01.26

Trust: 0.8

vendor:deltamodel:dopsoftscope:eqversion:version 4.0.8.21

Trust: 0.8

vendor:delta industrial automationmodel:dopsoftscope: - version: -

Trust: 0.7

vendor:deltamodel:electronics dopsoftscope:lteversion:<=4.0.8.21

Trust: 0.6

sources: ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // JVNDB: JVNDB-2021-001001 // NVD: CVE-2020-27277

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2021-001001
value: HIGH

Trust: 2.4

nvd@nist.gov: CVE-2020-27277
value: HIGH

Trust: 1.0

ZDI: CVE-2020-27277
value: HIGH

Trust: 0.7

CNVD: CNVD-2021-04429
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202101-254
value: HIGH

Trust: 0.6

VULMON: CVE-2020-27277
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-27277
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-04429
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IPA score: JVNDB-2021-001001
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 2.4

nvd@nist.gov: CVE-2020-27277
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2020-27277
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // VULMON: CVE-2020-27277 // JVNDB: JVNDB-2021-001001 // JVNDB: JVNDB-2021-001001 // JVNDB: JVNDB-2021-001001 // CNNVD: CNNVD-202101-254 // NVD: CVE-2020-27277

PROBLEMTYPE DATA

problemtype:CWE-822

Trust: 1.8

problemtype:CWE-476

Trust: 1.0

problemtype:CWE-121

Trust: 0.8

problemtype:CWE-787

Trust: 0.8

sources: JVNDB: JVNDB-2021-001001 // NVD: CVE-2020-27277

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202101-254

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202101-254

CONFIGURATIONS

sources: JVNDB: JVNDB-2021-001001

PATCH

title:CNCSoft - Delta | Download Centerurl:https://downloadcenter.deltaww.com/en-US/DownloadCenter?v=1&CID=06&itemID=060202&dataType=8

Trust: 0.8

title:DOPSoft - Delta | Download Centerurl:https://downloadcenter.deltaww.com/en-US/DownloadCenter?v=1&CID=06&itemID=060302&dataType=8&q=DOPSoft

Trust: 0.8

title: - url:https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05

Trust: 0.7

title:Patch for DOPSoft Null Pointer Dereference Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/244813

Trust: 0.6

title:Delta Electronics Industrial Automation DOPSoft Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139261

Trust: 0.6

sources: ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // JVNDB: JVNDB-2021-001001 // CNNVD: CNNVD-202101-254

EXTERNAL IDS

db:NVDid:CVE-2020-27277

Trust: 3.8

db:ICS CERTid:ICSA-21-005-05

Trust: 3.1

db:ZDIid:ZDI-21-033

Trust: 2.4

db:ICS CERTid:ICSA-21-005-06

Trust: 0.8

db:JVNid:JVNVU91044574

Trust: 0.8

db:JVNDBid:JVNDB-2021-001001

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-11663

Trust: 0.7

db:CNVDid:CNVD-2021-04429

Trust: 0.6

db:AUSCERTid:ESB-2021.0045

Trust: 0.6

db:CNNVDid:CNNVD-202101-254

Trust: 0.6

db:VULMONid:CVE-2020-27277

Trust: 0.1

sources: ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // VULMON: CVE-2020-27277 // JVNDB: JVNDB-2021-001001 // CNNVD: CNNVD-202101-254 // NVD: CVE-2020-27277

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05

Trust: 4.4

url:https://www.zerodayinitiative.com/advisories/zdi-21-033/

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27275

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27277

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27281

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-005-06

Trust: 0.8

url:http://jvn.jp/cert/jvnvu91044574

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0045/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-27277

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-21-033 // CNVD: CNVD-2021-04429 // VULMON: CVE-2020-27277 // JVNDB: JVNDB-2021-001001 // CNNVD: CNNVD-202101-254 // NVD: CVE-2020-27277

CREDITS

kimiya

Trust: 0.7

sources: ZDI: ZDI-21-033

SOURCES

db:ZDIid:ZDI-21-033
db:CNVDid:CNVD-2021-04429
db:VULMONid:CVE-2020-27277
db:JVNDBid:JVNDB-2021-001001
db:CNNVDid:CNNVD-202101-254
db:NVDid:CVE-2020-27277

LAST UPDATE DATE

2024-11-23T21:51:06.243000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-033date:2021-01-14T00:00:00
db:CNVDid:CNVD-2021-04429date:2021-01-20T00:00:00
db:VULMONid:CVE-2020-27277date:2021-03-09T00:00:00
db:JVNDBid:JVNDB-2021-001001date:2021-01-07T07:38:37
db:CNNVDid:CNNVD-202101-254date:2021-01-20T00:00:00
db:NVDid:CVE-2020-27277date:2024-11-21T05:20:59.040

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-033date:2021-01-14T00:00:00
db:CNVDid:CNVD-2021-04429date:2021-01-20T00:00:00
db:VULMONid:CVE-2020-27277date:2021-01-11T00:00:00
db:JVNDBid:JVNDB-2021-001001date:2021-01-07T07:38:37
db:CNNVDid:CNNVD-202101-254date:2021-01-05T00:00:00
db:NVDid:CVE-2020-27277date:2021-01-11T16:15:15.243