PatchSiren cyber security CVE debrief
CVE-2025-22882 Delta Electronics CVE debrief
Delta Electronics ISPSoft versions 3.19 and earlier are affected by a stack-based buffer overflow that can be triggered while parsing CBDGL files. According to the advisory, the flaw may let an attacker leverage debugging logic to execute arbitrary code. Delta recommends upgrading to ISPSoft v3.21 or later.
- Vendor
- Delta Electronics
- Product
- ISPSoft
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-29
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-29
- Advisory updated
- 2025-05-06
Who should care
Organizations that use Delta Electronics ISPSoft, especially engineering, automation, and OT teams that open or process CBDGL files on affected systems. Security teams managing industrial control software should treat this as a high-priority patch item because successful exploitation could lead to code execution on the workstation handling the file.
Technical summary
CISA’s CSAF advisory describes a stack-based buffer overflow in ISPSoft affecting versions 3.19 and prior. The issue is tied to parsing CBDGL files and is rated CVSS 3.1 7.8 High with vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access with user interaction is part of the attack conditions. The vendor remediation is to update to ISPSoft v3.21 or later.
Defensive priority
High. The combination of code execution potential, user-interaction requirements, and industrial software context makes this a strong near-term patching candidate for any environment that opens untrusted or externally sourced project files.
Recommended defensive actions
- Update Delta Electronics ISPSoft to v3.21 or later as recommended by the vendor.
- Identify systems that use ISPSoft 3.19 or earlier, including engineering workstations and shared lab systems.
- Restrict handling of untrusted CBDGL files until affected systems are patched.
- Use standard ICS defense-in-depth practices for engineering endpoints and file-transfer workflows.
- Review Delta’s advisory for any additional vendor guidance or environment-specific mitigations.
Evidence notes
This debrief is based on the CISA CSAF advisory for ICSA-25-119-02 / CVE-2025-22882 and the vendor remediation guidance included in the source corpus. The advisory states that ISPSoft versions 3.19 and prior are vulnerable and recommends updating to v3.21 or later. The source revision history shows an initial publication on 2025-04-29 and a follow-up revision on 2025-05-06 for typo fixes only.
Official resources
-
CVE-2025-22882 CVE record
CVE.org
-
CVE-2025-22882 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed through CISA’s coordinated advisory process. The source advisory was first published on 2025-04-29 and revised on 2025-05-06 for typo fixes; those dates should be used for issue timing context.