• Thread Author
Delta Electronics’ CNCSoft software, long regarded as a keystone utility in the integration between industrial automation and human-machine interfaces (HMIs), has entered a new phase—but not by evolution or enhancement. Instead, it’s a phase marked by high-severity, unpatched vulnerabilities and a sudden cessation of official support. The convergence of these factors, and the ongoing reliance on CNCSoft within critical infrastructure sectors across the globe, bring its risk profile into sharper focus than ever before. For industrial and cybersecurity professionals, the implications are profound, far-reaching, and demand immediate attention.

The Unfolding Story: Delta CNCSoft Vulnerabilities​

An official release from the United States Cybersecurity and Infrastructure Security Agency (CISA) has confirmed what many in the industrial control systems (ICS) security community have only suspected: Delta Electronics' CNCSoft HMI software harbors several critical vulnerabilities that, if exploited, can allow attackers to execute arbitrary code in the context of the running process. Characterized by out-of-bounds write flaws—a notorious class of memory corruption vulnerability catalogued as CWE-787—these issues have received new designations under the CVE-2025-47724 through CVE-2025-47727 monikers.
Key details from the advisory:
  • Products Affected: Delta Electronics CNCSoft v1.01.34 and prior.
  • Nature of the Vulnerability: Out-of-bounds write can be triggered by opening a malicious file, with code execution privileges matching that of the current user.
  • CVSS Scores:
  • v4.0 base score: 7.3 (“High”), indicating severe risk with low attack complexity.
  • v3.1 base score: 7.7 (“High”), local exploit, high impact on confidentiality, integrity, and availability.
  • Threat Vector: Local; these vulnerabilities are not known to be exploitable remotely.
  • Research Credit: Natnael Samson, via Trend Micro Zero Day Initiative, coordinated with CISA.
What sets this situation apart—and elevates its urgency? Delta Electronics has publicly stated it will not release any patches or mitigations, citing the discontinuation of the A-series CNC products for which CNCSoft is designed. Distribution of the software has been halted, and users are urged to migrate immediately to newer generations of Delta CNC systems.

Breaking Down the Technical Core​

The vulnerabilities share a near-identical structure: a failure to sufficiently validate user-supplied project files before processing. This type of oversight is particularly perilous in the context of HMI and industrial control software, where files may be shared, archived, or transferred as part of workflow routines. Each vulnerability (CVE-2025-47724, -47725, -47726, -47727) is rated with an identical score and description, reinforcing the systemic nature of the flaw across multiple code paths within CNCSoft.

Out-of-Bounds Write: A Persistent Industrial Challenge​

The CWE-787 class—out-of-bounds write—remains a frequent vector for code execution, system crashes, and data corruption attacks, especially in legacy software written in languages that permit direct memory manipulation without bounds checks (such as C or C++). The exploit scenario for CNCSoft relies on a user opening a file specifically engineered to exceed buffer allocations. Because the application fails to verify file content integrity before accessing it, an attacker gains a reliable mechanism to tamper with control flow or inject malicious instructions.
Critically, while exploitation must occur on the local system (via social engineering, compromised update mechanisms, or insider threat), the potential for impact remains severe: an attacker can gain control of the HMI, manipulate industrial operations, or stage further attacks within the network. Local vector exploits are frequently underestimated, but in highly networked industrial ecosystems—where USB drives, mapped network drives, and engineering laptops interact—this risk profile becomes intolerably high.

Industry Context: Who Should be Most Concerned?​

Delta Electronics, headquartered in Taiwan, is a preeminent provider of automation solutions—its products found widely throughout critical manufacturing and energy sectors. CNCSoft—a Windows-based HMI programming software—has long been integrated into workflows from small-scale machinery lines to advanced, multi-site energy automation centers.
Global Reach: According to Delta Electronics' own reporting, and corroborated by industrial market analyses, deployments exist worldwide, particularly in regions with concentrated industrial manufacturing and infrastructure modernization [source: 2024 Delta annual report; CISA ICS advisories].
Critical Infrastructure Implications: The CNCSoft vulnerabilities intersect directly with sectors where operational uptime and trustworthiness of digital controls are paramount. ICS and SCADA systems controlling real-world operations—be it in automotive plants, semiconductor fabrication, or power distribution—cannot tolerate a breach or disruption sourced from software exposure, even when nominally limited to local vectors.

Vendor Response and the Absence of a Patch​

Perhaps the most consequential element of this advisory is Delta Electronics’ posture: there will be no patch. This decision, attributed to the end-of-life status of the A-series control products, severs the usual safety net for organizations not yet migrated to newer platforms.
Instead, Delta has removed CNCSoft from public download and strongly urges all customers still using the affected series to upgrade to newer Delta CNC products and their corresponding software suites.

Official Mitigations Offered​

Delta’s mitigation guidance is both broad and conventional, focusing on foundational ICS security practices:
  • Do not open untrusted Internet links or email attachments.
  • Avoid exposing industrial networks or equipment to the Internet.
  • Segment operational technology (OT) systems behind firewalls, isolating them from enterprise IT networks.
  • Employ secure access mechanisms, such as a virtual private network (VPN), for any remote connectivity requirements.
This conservative guidance, while founded on solid logic, will provide little comfort to operators facing migration hurdles, long equipment refresh cycles, or regulatory compliance questions.

Analysis: Notable Strengths, and the Gaps Now Exposed​

Strengths of the Current Approach​

1. Transparency and Rapid Disclosure​

  • The vulnerabilities were discovered by a reputable researcher (Natnael Samson, under the auspices of Trend Micro’s Zero Day Initiative) and were quickly coordinated with CISA, a leading authority on ICS threat response.
  • Official vulnerability scoring and timely public advisories enhance the ability for asset owners to assess risk and plan mitigations.

2. Clear Migration Roadmap​

  • Delta’s advisory leaves little room for ambiguity: continued use of affected platforms is not recommended and comes with clear, unmitigated risk.
  • “Lift and shift” to newer Delta CNC product lines grants owners access to software that is being actively supported, with modern architectural and security upgrades.

3. Established, Reusable Security Best Practices​

  • The guidance draws from a deep repository of control systems security best practices, including CISA’s own Defense-in-Depth strategies, which have been shown to provide robust baseline protections even in the absence of a specific patch.

Risks and Critical Gaps​

1. Unpatched Legacy Systems are a Prime Target​

  • There is little consolation for organizations unable to upgrade, as CNCSoft’s vulnerabilities are now a matter of public record without a fix.
  • While Delta and CISA claim these vulnerabilities are not currently being exploited in the wild, the public documentation of “easy-to-exploit” local flaws will likely draw attention from both criminal and nation-state adversaries.
  • Caution: Although remote exploitation is not supported by the software design, "air-gapped" or segregated systems have, in documented incidents, been compromised through removable media and targeted insider actions.

2. Extended End-of-Life Risk Window​

  • Many critical infrastructure environments retain legacy systems well past their official support window, due to the immense costs of downtime, certification, or the risk of disrupting complex production lines.
  • Published research confirms that unpatched ICS software continues to be a preferred foothold for attackers aiming to gain persistent access to operational networks.

3. Potential for Engineering-Process Disruption​

  • The vulnerabilities target engineering-station software—a layer often overlooked in cybersecurity postures, but one that can enable attacks on PLCs, robots, or drives downstream.
  • Rogue activity on engineering workstations, even if only theoretically local, can have cascading operational effects, including the triggering of safety interlocks or the manipulation of sensor data.

Recommendations: Reducing the Real-World Attack Surface​

With no patch available and ongoing usage in the field, industrial network defenders must take a layered and proactive approach to risk management.

Segmentation and Isolation​

  • Enforce strict network segmentation: All systems running CNCSoft should be physically and logically segregated from business networks. Firewalls, unidirectional gateways, or data diodes (where feasible) can help prevent lateral movement from compromised endpoints.
  • Restrict physical media access: Disable USB ports where feasible. Implement strict removable media policies and scan all removable drives before use.

Harden the Human Element​

  • Train engineering and operational staff to identify phishing, social engineering, and suspicious file types. Attackers will exploit weak procedural knowledge as a first step toward planting malicious files.
  • Run periodic tabletop exercises simulating an infected engineering workstation scenario—ensure incident response teams are equipped to respond.

Asset Inventory and Patch Management​

  • Maintain rigorous asset inventories to identify all locations where affected versions of CNCSoft are in use.
  • For organizations unable to immediately migrate, consider virtualizing legacy environments or placing them in tightly controlled enclaves with no network or removable media exposure.

Logging, Monitoring, and Response​

  • Instrument endpoints with endpoint detection and response (EDR) or host intrusion prevention systems (HIPS) that can detect abnormal process behavior, especially the launching of unexpected binaries or scripts from within CNCSoft session contexts.
  • Regularly review logs for signs of suspicious file access or executable launches.

Immediate Migration Planning​

  • Initiate an aggressive timetable to transition all remaining A-series CNC and CNCSoft deployments to supported platforms.
  • Leverage vendor support channels and Delta’s recommended upgrade paths for guidance.

Broader Perspective: CNCSoft in the ICS Threat Landscape​

The vulnerabilities in Delta CNCSoft emerge amid a growing chorus of cyber-intrusion events impacting legacy industrial automation software globally. Major supply chain attacks and targeted ransomware campaigns have repeatedly demonstrated (SolarWinds, Colonial Pipeline, Norsk Hydro) that the perceived “isolation” of industrial networks is a dangerously outdated notion. Once vulnerabilities in engineering workstations are documented, adversaries may attempt to bridge the air gap by leveraging compromised removable media, phishing campaigns targeting plant staff, or exploiting transient code connections established during maintenance.
Supporting Evidence: CISA’s ICS advisories [2021-2025], reports from Dragos, Mandiant, and the SANS Institute emphasize the recurring exploitation of local vulnerabilities—despite stated “local-only” vectors—as a launching point for more damaging operational technology (OT) attacks.

Supply Chain and Third-Party Risks​

  • Companies that outsource engineering, maintenance, or software support for their Delta-based systems must ensure that all third parties adhere to the same mitigation strategies. Compromise of a service provider’s assets can have devastating ripple effects if trusted files or staff are used as entry vectors.
  • Documented cases, such as those involving the Triton/Trisis and Industroyer exploits, underline that attackers actively scope for exposed legacy engineering and HMI software to stage attacks.

Regulatory and Compliance Considerations​

Operators in regulated sectors—energy, critical manufacturing, water—must take particular note. Continued operation of unsupported, vulnerable systems may expose organizations to not only operational and safety risk, but also legal and regulatory consequences, especially where frameworks such as NERC CIP (energy), IEC 62443 (industrial automation), or country-specific critical infrastructure mandates require diligent software lifecycle management and vulnerability response.

Looking Forward: Lessons for ICS Software Life Cycles​

The story of Delta Electronics CNCSoft is not unique. Industrial automation platforms often outlive their original vendors’ support cycles, creating an ever-widening attack surface for attackers targeting high-value operational networks. Several universal lessons stand out:
  • Vulnerability disclosure is not enough: Rapid, actionable, and specific migration pathways are critical for end users, especially when immediate patching is unavailable.
  • Segmentation and strong hygiene are essential: The defense-in-depth model—promoted by both Delta and CISA—remains one of the few effective strategies for compensating for unremediated software flaws.
  • Engineering workstations need equal security attention: As crown-jewel attack targets, these should have the same level of monitoring, logging, and response as the most critical servers in any IT environment.
  • Vigilance is ongoing: Even with no current evidence of public exploitation, continuous monitoring, threat intelligence sharing, and engagement with vendor and government advisories are central to lowering incident probability.

Conclusion: Decisive Action Required​

For thousands of industrial operators, the disclosure of unpatched CNCSoft vulnerabilities marks a line in the sand. The absence of a patch or extended vendor support shifts the burden squarely onto asset owners and defenders. While Delta Electronics has provided a clear recommendation to migrate and given broad security advice, the unique nuances of every operational environment demand tailored, proactive, and comprehensive action.
Organizations that act swiftly—verifying inventories, planning replacements, and applying layered defensive measures—will significantly reduce their risk exposure. For those lagging behind, the window for comfortable inaction is closing rapidly. The CNCSoft case reinforces a hard truth in modern industrial cybersecurity: legacy does not mean immune, and end-of-life does not absolve responsibility.
Full details, technical guidance, and official resources for mitigations are available through both Delta Electronics’ product cybersecurity advisory and CISA’s industrial control systems portal. For any entity still reliant on CNCSoft, now is the time to chart the path forward—before adversaries do.

Source: CISA Delta Electronics CNCSoft | CISA