Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47728: CWE-787 Out-of-bounds Write in Delta Electronics CNCSoft-G2

0
High
VulnerabilityCVE-2025-47728cvecve-2025-47728cwe-787
Published: Wed Jun 04 2025 (06/04/2025, 08:11:06 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: CNCSoft-G2

Description

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:27:32 UTC

Technical Analysis

CVE-2025-47728 is an out-of-bounds write vulnerability classified under CWE-787 found in Delta Electronics' CNCSoft-G2 software. The root cause is the software's failure to properly validate user-supplied files before processing. When a user opens a specially crafted malicious file, the vulnerability allows an attacker to write data outside the intended memory bounds, potentially overwriting critical memory structures. This can lead to arbitrary code execution within the context of the current process, which typically runs with the privileges of the user. The CVSS 4.0 score is 7.3 (high), reflecting the complexity of exploitation requiring local access, high privileges, and user interaction, but with severe impact on confidentiality, integrity, and availability. The vulnerability affects version 0 of CNCSoft-G2, with no patches currently available and no known exploits in the wild. CNCSoft-G2 is used in industrial control systems for CNC machines, making this vulnerability particularly critical in manufacturing environments where disruption or compromise can have serious operational consequences.

Potential Impact

The vulnerability enables attackers to execute arbitrary code with the privileges of the current user, potentially leading to full system compromise if the user has elevated rights. This can result in unauthorized access to sensitive manufacturing data, manipulation or disruption of CNC machine operations, and potential downtime or damage to physical equipment. The integrity of manufacturing processes can be compromised, leading to defective products or safety hazards. Confidentiality breaches may expose proprietary designs or operational details. Availability can be affected if the system crashes or is taken offline due to exploitation. Given the industrial context, the impact extends beyond IT systems to physical safety and operational continuity, making this a high-risk vulnerability for organizations relying on CNCSoft-G2 in their production environments.

Mitigation Recommendations

Organizations should implement strict file validation and restrict the types of files that can be opened by CNCSoft-G2 to trusted sources only. Until a patch is released, limit user privileges to the minimum necessary to operate CNCSoft-G2, avoiding high privilege accounts for routine use. Employ application whitelisting and endpoint protection solutions to detect and block attempts to open or execute malicious files. Network segmentation should isolate CNCSoft-G2 systems from general IT networks to reduce exposure. Regularly audit and monitor logs for unusual file access or process behavior. Establish strict operational procedures for handling files and educate users about the risks of opening untrusted files. Once a vendor patch is available, prioritize its deployment in all affected environments. Consider implementing additional runtime protections such as memory protection mechanisms and exploit mitigation technologies to reduce the risk of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Deltaww
Date Reserved
2025-05-08T08:08:01.077Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6840003b182aa0cae2a406bb

Added to database: 6/4/2025, 8:13:47 AM

Last enriched: 3/18/2026, 6:27:32 PM

Last updated: 3/25/2026, 1:41:51 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses