Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15358: CWE-20 Improper Input Validation in Delta Electronics DVP-12SE11T

0
High
VulnerabilityCVE-2025-15358cvecve-2025-15358cwe-20
Published: Tue Dec 30 2025 (12/30/2025, 09:04:41 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: DVP-12SE11T

Description

DVP-12SE11T - Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/30/2025, 22:43:09 UTC

Technical Analysis

CVE-2025-15358 identifies a vulnerability in the Delta Electronics DVP-12SE11T programmable logic controller, specifically due to improper input validation categorized under CWE-20. This flaw allows an unauthenticated remote attacker to send crafted network packets that the device fails to properly validate, leading to a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing the device to crash, reboot, or become unresponsive. The CVSS v3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope remains unchanged (S:U), indicating the impact is limited to the vulnerable component itself. The DVP-12SE11T is widely used in industrial automation for controlling machinery and processes, making availability critical. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. However, the nature of the vulnerability means that attackers could disrupt industrial operations remotely, potentially causing production halts or safety risks. The vulnerability was reserved and published on December 30, 2025, by the assigner 'Deltaww'.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk to operational continuity. The DVP-12SE11T PLCs are integral to process control and automation; a denial of service could halt production lines, disrupt supply chains, and cause financial losses. In safety-critical environments, such as power plants or transportation systems, availability loss could also lead to hazardous conditions. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and easily if the devices are exposed or accessible within internal networks. This elevates the threat level for organizations with insufficient network segmentation or weak perimeter defenses. Additionally, the absence of known exploits in the wild provides a window for proactive defense, but also means attackers may develop exploits soon after disclosure. European organizations must prioritize identifying affected devices and implementing compensating controls to mitigate potential operational disruptions.

Mitigation Recommendations

1. Immediately identify and inventory all Delta Electronics DVP-12SE11T devices within the network. 2. Implement strict network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. 3. Deploy firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the PLCs, especially malformed packets that could trigger the DoS. 4. Limit remote access to the devices using VPNs with strong authentication and restrict access to known IP addresses. 5. Monitor device logs and network traffic for anomalies indicating attempted exploitation. 6. Engage with Delta Electronics for official patches or firmware updates and apply them promptly once available. 7. Conduct regular security assessments and penetration testing focused on industrial control systems to detect similar vulnerabilities. 8. Train operational technology (OT) personnel on recognizing and responding to DoS incidents affecting PLCs. 9. Develop and test incident response plans specific to industrial control system disruptions. 10. Consider deploying redundant or failover PLCs to maintain availability during an attack.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Deltaww
Date Reserved
2025-12-30T07:32:10.511Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a8db813ff03e2be60a

Added to database: 12/30/2025, 10:22:32 PM

Last enriched: 12/30/2025, 10:43:09 PM

Last updated: 2/7/2026, 12:42:21 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats