PatchSiren cyber security CVE debrief
CVE-2025-47727 Delta Electronics CVE debrief
Delta Electronics CNCSoft contains an input-validation flaw affecting files opened by users. In the supplied advisory, a maliciously crafted file can trigger code execution in the context of the current process. Delta states the affected A-series CNC products have been discontinued, and no vendor fix is planned.
- Vendor
- Delta Electronics
- Product
- CNCSoft
- CVSS
- HIGH 7.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-24
- Original CVE updated
- 2025-06-24
- Advisory published
- 2025-06-24
- Advisory updated
- 2025-06-24
Who should care
OT and manufacturing teams using Delta Electronics CNCSoft, especially engineering workstations and support staff who open project or data files from outside the trusted environment. Security teams responsible for isolating industrial control systems, restricting file handling, and planning replacement for discontinued software should treat this as a high-priority review item.
Technical summary
The advisory describes improper validation of user-supplied files in Delta Electronics CNCSoft. An attacker who can get a user to open a malicious file may achieve code execution within the current process. The supplied affected-product listing covers Delta Electronics CNCSoft version 1.01.34 and earlier. The CVSS vector provided is local, requires user interaction and high privileges, and indicates scope change with high confidentiality, integrity, and availability impact.
Defensive priority
High. The issue can lead to code execution in an OT-related application, the vendor says no remediation is planned because the product line is discontinued, and the attack path depends on common user file-opening behavior rather than complex exploitation.
Recommended defensive actions
- Inventory CNCSoft installations and confirm whether any systems are running version 1.01.34 or earlier.
- Treat untrusted files as unsafe; do not open unsolicited attachments or files in CNCSoft workflows.
- Restrict who can access engineering workstations and limit local administrative/high-privilege use.
- Isolate affected systems from the Internet and from broader business networks where possible.
- Place systems behind firewalls and use segmented network zones for industrial assets.
- Use secure remote access methods such as VPNs when remote administration is required.
- Plan migration to newer Delta CNC products and their corresponding software, since Delta states CNCSoft is discontinued and will be removed from the Delta Download Center.
- Review Delta's product cybersecurity advisory and customer support resources for product-specific guidance.
Evidence notes
Supplied source data identifies CVE-2025-47727 / ICSA-25-175-02 as published and last modified on 2025-06-24T06:00:00Z. The affected product entry lists Delta Electronics CNCSoft: <=v1.01.34. The advisory text says the software does not properly validate user-supplied files and that opening a maliciously crafted file may allow code execution in the current process. Delta's remediation text says the A-series CNC products supported by CNCSoft have been discontinued and no fix is planned.
Official resources
-
CVE-2025-47727 CVE record
CVE.org
-
CVE-2025-47727 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory and CVE on 2025-06-24T06:00:00Z, and the supplied data shows the same timestamp for the last modification. No CISA KEV date is present in the provided enrichment.