Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15359: CWE-787 Out-of-bounds Write in Delta Electronics DVP-12SE11T

0
Critical
VulnerabilityCVE-2025-15359cvecve-2025-15359cwe-787
Published: Tue Dec 30 2025 (12/30/2025, 09:07:04 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: DVP-12SE11T

Description

DVP-12SE11T - Out-of-bound memory write Vulnerability

AI-Powered Analysis

AILast updated: 12/30/2025, 22:43:25 UTC

Technical Analysis

CVE-2025-15359 is an out-of-bounds write vulnerability classified under CWE-787 found in the Delta Electronics DVP-12SE11T PLC. This vulnerability arises when the device improperly handles memory boundaries, allowing an attacker to write data outside the intended buffer limits. Such out-of-bounds writes can corrupt memory, leading to unpredictable behavior including system crashes, denial of service, or potentially arbitrary code execution if exploited skillfully. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS 3.1 base score of 9.1 reflects the critical severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. This means the attacker cannot directly steal information but can severely disrupt or manipulate the device’s operation. The DVP-12SE11T is commonly used in industrial automation and control systems, which are integral to manufacturing and critical infrastructure. Despite no known public exploits at the time of publication, the vulnerability’s characteristics suggest it could be weaponized by threat actors targeting industrial environments. The lack of available patches at publication time necessitates immediate defensive measures to reduce exposure. The vulnerability’s presence in a widely deployed PLC model raises concerns about potential cascading effects on industrial processes and safety systems if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-15359 is significant due to the widespread use of Delta Electronics PLCs in manufacturing, energy, transportation, and critical infrastructure sectors. Successful exploitation could lead to unauthorized manipulation of industrial processes, causing production downtime, equipment damage, or safety incidents. Integrity and availability impacts could disrupt supply chains and critical services, with potential economic and safety consequences. The vulnerability’s remote and unauthenticated nature increases the risk of attacks originating from external threat actors, including nation-state adversaries or cybercriminal groups targeting industrial control systems. Given Europe's reliance on automated industrial systems, this vulnerability could affect operational continuity and national infrastructure resilience. The absence of confidentiality impact reduces the risk of data theft but does not mitigate the severe operational risks posed by integrity and availability compromises. Organizations may face regulatory and compliance challenges if disruptions affect critical services or safety standards.

Mitigation Recommendations

1. Immediate network segmentation: Isolate DVP-12SE11T devices from general IT networks and restrict access to trusted management stations only. 2. Implement strict firewall rules and access control lists (ACLs) to limit inbound traffic to the PLCs, allowing only necessary protocols and IP addresses. 3. Monitor network traffic for anomalous patterns indicative of exploitation attempts, such as unexpected memory access or malformed packets targeting the PLC. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned for industrial protocols used by Delta PLCs. 5. Enforce strong physical security controls to prevent unauthorized local access to the devices. 6. Coordinate with Delta Electronics for timely patching once a fix is released; prioritize patch deployment in critical environments. 7. Conduct regular security audits and vulnerability assessments focused on industrial control systems. 8. Train operational technology (OT) personnel on recognizing and responding to potential exploitation signs. 9. Maintain up-to-date backups and incident response plans tailored for industrial environments to minimize downtime in case of compromise. 10. Consider deploying application whitelisting or runtime integrity monitoring on PLC management systems to detect unauthorized changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Deltaww
Date Reserved
2025-12-30T07:32:14.455Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a8db813ff03e2be60d

Added to database: 12/30/2025, 10:22:32 PM

Last enriched: 12/30/2025, 10:43:25 PM

Last updated: 1/8/2026, 7:23:56 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats