PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-5726 DeltaWW CVE debrief

CVE-2026-5726 is a high-severity stack-based buffer overflow in Delta Electronics ASDA-Soft identified in CISA’s advisory ICSA-26-106-01. According to the advisory, the issue affects ASDA-Soft version 7.2.0.0 during parsing of malformed .par files, and Delta recommends upgrading to v7.2.6.0 or later. The supplied CVSS vector indicates a local attack with required user interaction and high impact to confidentiality, integrity, and availability.

Vendor
DeltaWW
Product
Delta Electronics ASDA-Soft <=V7.2.2.0
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-16
Original CVE updated
2026-04-16
Advisory published
2026-04-16
Advisory updated
2026-04-16

Who should care

Organizations using Delta Electronics ASDA-Soft, especially teams responsible for engineering workstations, motion-control environments, and other OT/ICS assets that open or process .par files. Security teams should also care if ASDA-Soft is present on shared support laptops or systems used to exchange project files.

Technical summary

The advisory describes a stack-based buffer overflow triggered when ASDA-Soft parses malformed .par files. The supplied CVSS 3.1 vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which is consistent with a local vulnerability requiring user interaction and carrying high potential impact. The source corpus does not state exploitation in the wild or provide a public proof of concept; the supported remediation is to upgrade to ASDA-Soft v7.2.6.0 or later.

Defensive priority

High. A vendor fix is available, the affected component is a file parser, and the vulnerability can be triggered through user-assisted handling of malformed files. Prioritize patching systems that routinely open imported project files and verify that vulnerable versions are removed from active engineering endpoints.

Recommended defensive actions

  • Upgrade Delta Electronics ASDA-Soft to v7.2.6.0 or later.
  • Review where ASDA-Soft is installed and identify systems that open or exchange .par files.
  • Restrict untrusted file handling on engineering workstations and validate file sources before opening them.
  • Follow Delta’s general ICS guidance: keep control-system networks segmented, place remote access behind firewalls, and use VPNs for necessary remote connectivity.
  • Use CISA ICS recommended practices to reinforce defense-in-depth and reduce exposure of OT assets.

Evidence notes

This debrief is based only on the supplied CISA CSAF advisory data and the official links included in the source corpus. The core facts used here are: the CVE identifier, publication date (2026-04-16T06:00:00.000Z), the affected product/version statement for ASDA-Soft 7.2.0.0, the malformed .par file parsing trigger, the vendor recommendation to upgrade to v7.2.6.0 or later, and the supplied CVSS vector. The vendor metadata in the prompt is marked low-confidence, but the advisory itself attributes the issue to Delta Electronics and cites Delta remediation guidance.

Official resources

Publicly disclosed in CISA’s advisory on 2026-04-16. The source corpus does not include evidence of exploitation in the wild, KEV listing, or ransomware association.