Impact
Delta Electronics COMMGR2 suffers a buffer over-read that can be exploited to trigger a denial‑of‑service condition. The flaw allows an attacker to cause the application to read beyond the end of a buffer, leading to a crash or abrupt termination of the COMMGR2 process. The vulnerability maps to CWE‑125, a classic input validation failure. As the issue is not tied to authentication or privilege escalation, the impact is strictly limited to availability of the affected service.
Affected Systems
DeltaWW COMMGR2 is affected on all platforms supported by Delta, including Windows variants. Any deployment of COMMGR2 prior to version 2.11.1 is vulnerable; the vendor recommends upgrading to v2.11.1 or later to receive the fix.
Risk and Exploitability
The CVSS base score of 7.5 signals high severity, driven by the low difficulty to exploit the buffer over-read once the attacker gains network access to the COMMGR2 process. EPSS indicates a probability of less than 1%, suggesting that while exploitation events are uncommon, they are possible. The vulnerability is not listed in the CISA KEV catalog, limiting evidence of widespread attacks. The likely attack path involves network contact with the exposed service; this conclusion is inferred from the description and is not explicitly confirmed. The attack could be performed without special credentials, presenting a significant DoS threat.
OpenCVE Enrichment