PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-1361 Delta Electronics CVE debrief

CVE-2026-1361 affects Delta Electronics ASDA-Soft version 7.2.0.0 and is described by CISA as a stack-based buffer overflow in .par file parsing. The flaw stems from incorrect validation of a user-controlled size parameter against the local buffer limit, allowing writes past the end of the buffer. Delta states the issue is fixed in ASDA-Soft v7.2.2.0.

Vendor
Delta Electronics
Product
ASDA-Soft
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-17
Original CVE updated
2026-02-17
Advisory published
2026-02-17
Advisory updated
2026-02-17

Who should care

Organizations that use ASDA-Soft on engineering workstations or other OT/industrial control endpoints should prioritize this advisory, especially teams responsible for patching, workstation hardening, and control-system network segregation.

Technical summary

The supplied advisory describes a stack-based buffer overflow in ASDA_Soft 7.2.0.0 triggered during parsing of .par files. The root cause is improper bounds checking on a user-controlled size parameter, which can permit out-of-bounds writes on the stack. The supplied CVSS vector rates the issue as high severity (CVSS 3.1: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating local attack conditions with user interaction required.

Defensive priority

High. This is a high-severity memory corruption issue in industrial software, and Delta has already provided a fixed release. For exposed or operationally important ASDA-Soft deployments, patching should be treated as a near-term priority.

Recommended defensive actions

  • Upgrade ASDA-Soft to v7.2.2.0 or later, as identified by Delta Electronics.
  • Review Delta advisory Delta-PCSA-2026-00003 and apply any vendor-provided compensating controls.
  • Restrict ASDA-Soft use to trusted operators and limit exposure of engineering workstations that process .par files.
  • Keep control-system networks and remote devices behind firewalls, and isolate them from the business network.
  • Use VPN-based remote access rather than direct Internet exposure for OT environments.
  • Follow CISA industrial control system best practices for patching, segmentation, and defense in depth.

Evidence notes

All material claims in this debrief are drawn from the supplied CISA CSAF advisory record for ICSA-26-048-02, the embedded Delta remediation notes, and the provided CVSS vector. The source set identifies the affected product as Delta Electronics ASDA-Soft version 7.2.0.0, the fixed release as v7.2.2.0, and includes general ICS defensive guidance. The supplied enrichment marks this as not in CISA KEV, with no ransomware-campaign attribution provided.

Official resources

CISA published the advisory and source record on 2026-02-17, with the supplied CVE and advisory timeline showing the same publication and modification date. No KEV listing is present in the supplied enrichment for this CVE.