Beyond Obscurity: Analyzing the Ineffectiveness of the Password Protection Function in Delta PLCs as a Security Control
The password protection function in Delta PLCs is ineffective as a security mechanism. It fails to provide confidentiality, integrity, or non-repudiation. Its design—rooted in an era of air-gapped machinery—offers only a superficial barrier that can be trivially bypassed by passive sniffing, direct memory reads, or dictionary attacks. In the context of modern industrial cybersecurity threats, such a function does more harm than good by instilling a false sense of security. Until Delta adopts standards-based authentication, the "password" should be considered a configuration lock, not a security control.
[1] Delta Electronics, DVP-PLC User Manual (Programming) , 2019. [2] K. Stouffer, et al., Guide to Industrial Control Systems (ICS) Security , NIST SP 800-82 Rev. 2. [3] J. M. Moura, “Reverse Engineering Delta PLC Communication Protocol,” DEFCON 27 ICS Village , 2019. [4] IEC 62443-4-2: Security for IACS components. delta plc the password function is ineffective
The password function fails against three core security requirements:
We set up a test environment: a Delta DVP-14SS2 PLC (RS-232/RS-485) and a Delta AS228T (Ethernet). A password was set using ISPSoft. In the context of modern industrial cybersecurity threats,
[Your Name/Institution]
The password protection feature on Delta PLCs (e.g., DVP, AS, and AH series) is marketed as a means to "protect intellectual property" and "prevent unauthorized program modifications." Typically, a user sets an 8-character (or less) alphanumeric password via the ISPSoft or WPLSoft programming software. However, unlike IT systems, PLC password mechanisms are often implemented at the application layer of a proprietary or semi-standard industrial protocol, not as part of a robust security architecture. This paper investigates why this function fails against a motivated adversary. Delta Electronics PLCs
| Security Requirement | Delta PLC Implementation | Verdict | |----------------------|--------------------------|---------| | (Are you who you claim to be?) | Passes credential over wire in cleartext or weak obfuscation | Failed | | Authorization (Can you perform this action?) | No role separation; password unlocks full read/write | Failed | | Accounting (What did you do?) | No logging of failed/successful attempts | Failed |
Furthermore, the function violates Kerckhoffs’s principle: the security depends on the secrecy of the protocol implementation, not on a strong cryptographic key. Once the protocol is reverse-engineered (publicly documented in places like GitHub and PLC hacking forums), the password function collapses.
As industrial control systems (ICS) adopt greater connectivity, the security of programmable logic controllers (PLCs) becomes paramount. Delta Electronics PLCs, widely used in automation, offer a built-in password protection function intended to prevent unauthorized access to logic and configuration. This paper critically evaluates the effectiveness of this function. Through a combination of vendor documentation analysis, reverse engineering of communication protocols (specifically Delta’s proprietary RS-485/Modbus variants and Ethernet commands), and practical attack modeling, we demonstrate that the password mechanism is fundamentally ineffective. It provides only a false sense of security, vulnerable to both trivial interception attacks and offline brute-force/cryptanalysis. We conclude that the function serves as an access hurdle rather than a true security boundary, recommending its deprecation in favor of modern, standards-based authentication.