Cyber Posture

CVE-2025-22881

High

Published: 26 February 2025

Published
26 February 2025
Modified
11 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22881 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Deltaww Cncsoft-G2. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the heap-based buffer overflow by identifying, testing, and applying vendor patches as specified in Delta Electronics advisory PCSA-2025-00003.

prevent

Mandates validation of user-supplied data lengths before copying to fixed-length heap buffers, addressing the root cause of the vulnerability.

prevent

Deploys memory protections like non-executable memory and ASLR to block arbitrary code execution even if the heap buffer overflow occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Client-side heap buffer overflow enabling arbitrary code execution, triggered by user opening malicious file or visiting malicious web page.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to…

more

execute code in the context of the current process.

Deeper analysisAI

CVE-2025-22881 is a heap-based buffer overflow vulnerability in Delta Electronics CNCSoft-G2, stemming from a lack of proper validation of the length of user-supplied data before copying it into a fixed-length heap-based buffer. This flaw, classified under CWE-122 and assigned a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), affects the CNCSoft-G2 software used in industrial control systems.

The vulnerability can be exploited locally by an attacker who tricks a user into visiting a malicious web page or opening a malicious file. No privileges are required (PR:N), but user interaction is necessary (UI:R), and the attack has low complexity (AC:L). Successful exploitation allows arbitrary code execution in the context of the current process, potentially leading to high impacts on confidentiality, integrity, and availability.

Delta Electronics has published security advisory PCSA-2025-00003, available at https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00003_CNCSoft-G2%20-%20Heap-based%20Buffer%20Overflow_v1.pdf, which provides details on mitigation and patching instructions for affected CNCSoft-G2 versions.

Details

CWE(s)

Affected Products

deltaww
cncsoft-g2
≤ 2.1.0.20

CVEs Like This One

CVE-2025-22880Same product: Deltaww Cncsoft-G2
CVE-2026-3094Same product: Deltaww Cncsoft-G2
CVE-2026-5726Same vendor: Deltaww
CVE-2026-1361Same vendor: Deltaww
CVE-2026-0975Same vendor: Deltaww
CVE-2025-21305Shared CWE-122
CVE-2026-23719Shared CWE-122
CVE-2025-35984Shared CWE-122
CVE-2025-27173Shared CWE-122
CVE-2025-50129Shared CWE-122

References