Delta’s Dicey PRNG: Weak Randomness Rolls Out Red Carpet for Hackers!

View CSAF: Delta Electronics’ COMMGR software faces a high-risk vulnerability due to a weak pseudo-random number generator, making it vulnerable to remote code execution. While Version 1 is no longer supported, Delta plans to patch Version 2. Users should batten down their digital hatches and follow recommended security measures.

Pro Dashboard

Hot Take:

Ah, the joys of technology—where your software management platform is as secure as a wet paper bag. Kudos to Delta Electronics for giving cybercriminals the equivalent of a skeleton key to their COMMGR software. It’s like they decided to hand out free passes to their virtual PLCs with “please don’t hack me” notes attached. But don’t worry, a fix is on the way… for Version 2, at least. Version 1 users, you’re on your own. Just remember, folks, in the world of cybersecurity, randomness is your friend. It’s too bad this PRNG didn’t get that memo.

Key Points:

  • Delta Electronics’ COMMGR software is vulnerable due to weak PRNG.
  • All versions of COMMGR Version 1 and 2 are affected.
  • Vulnerability allows remote execution of arbitrary code.
  • COMMGR Version 1 has reached end of life; only Version 2 will receive fixes.
  • Trend Micro’s ZDI reported the issue, with a CVSS v4 score of 9.3.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?