Delta Electronics COMMGR2 Flaws Score CVSS 9.8
Two critical vulnerabilities in Delta Electronics COMMGR2 enable remote code execution without authentication. ICS operators should patch to v2.11.1 immediately.
Delta Electronics released patches for two critical vulnerabilities affecting COMMGR2, its communication management software widely deployed in industrial automation environments. Both flaws allow unauthenticated remote attackers to execute arbitrary code on affected systems—a worst-case scenario for operational technology networks.
CVE-2026-3630 is a stack-based buffer overflow carrying a CVSS score of 9.8. The companion vulnerability, CVE-2026-3631, is an out-of-bounds read that scores 7.5 and enables denial-of-service attacks. Both affect COMMGR2 versions 2.11.0 and earlier on Windows platforms.
What Makes These Vulnerabilities Dangerous
The attack parameters are about as bad as they get. Network-accessible, no authentication required, no user interaction needed. An attacker with network access to COMMGR2 can trigger the buffer overflow remotely, potentially gaining full control over the host system. In ICS environments, that often means access to PLCs, HMIs, and other process control equipment.
COMMGR2 serves as a communication gateway in Delta's industrial automation ecosystem. It handles protocol conversion and data exchange between various devices—exactly the kind of chokepoint attackers target when trying to pivot through OT networks.
The stack-based buffer overflow (CWE-121) occurs due to improper bounds checking on input data. Successful exploitation gives attackers the ability to overwrite return addresses and hijack program execution. The out-of-bounds read vulnerability, while less severe, can crash the service and disrupt industrial operations.
Affected Versions and Remediation
All COMMGR2 installations running versions 0 through 2.11.0 are vulnerable. Delta Electronics published advisory Delta-PCSA-2026-00005 with remediation guidance.
Immediate actions:
- Upgrade COMMGR2 to version 2.11.1 or later
- Restrict network access to COMMGR2 systems using firewall rules
- Monitor for unusual connection attempts to COMMGR2 services
- Segment OT networks from corporate IT infrastructure
If patching isn't immediately possible, isolate affected systems behind additional network controls. These vulnerabilities have already been sighted in the wild—two separate observations according to threat tracking databases.
ICS Vulnerabilities Continue to Surge
This disclosure follows a pattern of critical ICS vulnerabilities hitting the industry in recent weeks. CISA recently added Hikvision and Rockwell vulnerabilities to its Known Exploited Vulnerabilities catalog, underscoring the sustained targeting of industrial systems. The MongoDB memory vulnerability we covered earlier demonstrates that both IT and OT platforms remain under heavy scrutiny from vulnerability researchers and attackers alike.
Delta Electronics has historically been responsive to security reports, but ICS vendors across the board struggle with the long patch cycles inherent to operational technology. Many facilities run equipment that can't be taken offline for updates without significant production impact.
Why This Matters
Buffer overflows in industrial software carry consequences beyond typical IT breaches. Compromising a communication gateway can give attackers visibility into process data, the ability to manipulate control signals, or simply the power to halt operations. For manufacturing facilities, energy infrastructure, or water treatment plants running Delta equipment, these patches should be treated as emergency priorities.
The unchanged severity metrics between the two CVEs—both rated critical or high—suggest the underlying code paths share similar weaknesses. Organizations should audit their Delta Electronics deployments comprehensively, not just systems running COMMGR2. Where there's one buffer overflow, there are often more.
Related Articles
Atop EHG2408 Industrial Switch RCE Hits CVSS 9.3
CVE-2026-3823 allows unauthenticated attackers to execute code on Atop Technologies industrial switches. Firmware 3.36 patches the critical buffer overflow.
Mar 9, 2026CISA Adds Hikvision and Rockwell CVSS 9.8 Flaws to KEV Catalog
Federal agencies must patch CVE-2017-7921 and CVE-2021-22681 by March 26. Hikvision cameras face active exploitation; Rockwell PLCs at risk.
Mar 6, 2026Grandstream VoIP Phones Vulnerable to Silent Eavesdropping
CVE-2026-2329 (CVSS 9.3) enables unauthenticated RCE on Grandstream GXP1600 VoIP phones. Attackers can intercept calls, steal credentials. Patch to 1.0.7.81.
Feb 19, 2026Talos Fuzzes Industrial Gateway, Finds Six DoS Vulnerabilities
Cisco Talos researcher uses 'good enough' emulation to fuzz Socomec DIRIS M-70 energy gateway, discovering CVE-2025-54848 through CVE-2025-55222 in Modbus protocol handling.
Feb 18, 2026