Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59301: CWE-20 Improper Input Validation in Delta Electronics DVP15MC11T

0
Medium
VulnerabilityCVE-2025-59301cvecve-2025-59301cwe-20
Published: Mon Dec 22 2025 (12/22/2025, 02:56:42 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: DVP15MC11T

Description

Delta Electronics DVP15MC11T lacks proper validation of the modbus/tcp packets and can lead to denial of service.

AI-Powered Analysis

AILast updated: 12/22/2025, 03:25:50 UTC

Technical Analysis

CVE-2025-59301 identifies a vulnerability in the Delta Electronics DVP15MC11T PLC, specifically related to improper input validation of Modbus/TCP packets, categorized under CWE-20. The device fails to adequately validate incoming Modbus/TCP requests, which can be crafted to disrupt normal operation, resulting in a denial of service. The vulnerability requires an attacker to have high-level privileges and user interaction, indicating that exploitation is not trivial but feasible in environments where attackers gain authenticated access. The CVSS 3.1 base score is 4.0 (medium), reflecting the attack vector as adjacent network (AV:A), high attack complexity (AC:H), high privileges required (PR:H), and user interaction required (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity loss. The DVP15MC11T is used in industrial control systems, often in manufacturing and critical infrastructure sectors, where Modbus/TCP is a common protocol for device communication. Improper validation could allow malformed packets to crash or freeze the PLC, halting automated processes. No patches or known exploits currently exist, but the vulnerability's presence necessitates proactive defense measures. The lack of patch availability increases the risk window for affected organizations.

Potential Impact

For European organizations, particularly those in manufacturing, energy, and critical infrastructure sectors relying on Delta Electronics PLCs, this vulnerability poses a risk of operational disruption. A successful denial of service attack could halt production lines, cause safety system failures, or disrupt energy distribution, leading to financial losses and potential safety hazards. Given the reliance on Modbus/TCP in industrial automation, the vulnerability could affect interconnected systems, amplifying the impact. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate insider threats or advanced persistent threat actors who may gain access. The medium severity indicates moderate urgency, but the operational impact in critical sectors could be significant. European organizations with less mature industrial cybersecurity practices may be more vulnerable to exploitation.

Mitigation Recommendations

Organizations should immediately implement network segmentation to isolate the DVP15MC11T PLCs from general IT networks and restrict Modbus/TCP traffic to trusted sources only. Employ strict access controls and multi-factor authentication for any interfaces that allow configuration or communication with the PLC. Monitor network traffic for unusual Modbus packet patterns or malformed requests that could indicate exploitation attempts. Since no patches are currently available, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for anomalous Modbus traffic. Conduct regular security audits and employee training to reduce the risk of insider threats. Prepare incident response plans specifically for industrial control system disruptions. Engage with Delta Electronics for updates on patch releases and apply them promptly once available. Additionally, consider implementing failover or redundancy mechanisms to maintain operational continuity in case of device failure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Deltaww
Date Reserved
2025-09-12T01:31:46.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6948ba199b5fbca4f5110eab

Added to database: 12/22/2025, 3:25:13 AM

Last enriched: 12/22/2025, 3:25:50 AM

Last updated: 12/22/2025, 5:43:44 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Sharp Display Solutions, Ltd. NP-PA1705UL-W, NP-PA1705UL-W+, NP-PA1705UL-B, NP-PA1705UL-B+, NP-PA1505UL-W, NP-PA1505UL-W+, NP-PA1505UL-B, NP-PA1505UL-B+, NP-PA1505UL-BJL NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-B, NP-PV800UL-B+, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-B, NP-PV710UL-B+, NP-PV800UL-W1, NP-PV800UL-B1, NP-PV710UL-W1, NP-PV710UL-B1, NP-PV800UL-B1G, NP-PV710UL-B1G, NP-PV800UL-WH, NP-PV710UL-WH, NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH NP-PV710UL+ NP-PA1004UL-W, NP-PA1004UL-WG, NP-PA1004UL-W+, NP-PA1004UL-WH, NP-PA1004UL-B, NP-PA1004UL-BG, NP-PA1004UL-B+, NP-PA804UL-W, NP-PA804UL-WG, NP-PA804UL-W+, NP-PA804UL-WH, NP-PA804UL-B, NP-PA804UL-BG, NP-PA804UL-B+, NP-PA1004UL-BH, NP-PA804UL-BH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG NP-CU4300XD, NP-CU4200XD, NP-CU4200WD, NP-UM383WL, NP-UM383WLG, NP-CJ2200WD, NP-PH3501QL, NP-PH3501QL+, NP-PH2601QL, NP-PH2601QL+, NP-PH350Q40L, NP-PH260Q30L, NP-PX1005QL-W, NP-PX1005QL-B, NP-PX1005QL-B+, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11544: CWE-912: Hidden Functionality in Sharp Display Solutions, Ltd. NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+, NP-CG6500UL, NP-CG6500WL, NP-CB4500UL, NP-CB4500WL, NP-P525ULH, NP-P525WLH, NP-P605ULH, NP-P554U, NP-P554UG, NP-P554U+, NP-P554W, NP-P554WG, NP-P554W+, NP-P474U, NP-P474UG, NP-P474W, NP-P474WG, NP-P604XG, NP-P604X+, NP-P603XG, NP-P523X+, NP-PE523XG, NP-PE523X+, NP-CF6600U, NP-CF6600W, NP-CF6700X, NP-CF6500X, NP-CB4600U, NP-P554UH, NP-P554WH, NP-P474UH, NP-P474WH, NP-P604XH, NP-P603XH, NP-PE523XH, NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG ,NP-ME401W, NP-ME361W, NP-ME331W, NP-ME301W, NP-ME401X, NP-ME361X, NP-ME331X, NP-ME301X, NP-ME401WG, NP-ME361WG, NP-ME331WG, NP-ME301WG, NP-ME401XG, NP-ME361XG, NP-ME331XG, NP-ME301XG, NP-CA4155W, NP-CA4350X, NP-CA4255X, NP-CA4155X, NP-CA4115X, NP-MC331WG, NP-MC421XG, NP-MC401XG, NP-MC371XG, NP-MC331XG, NP-MC301XG, NP-CK4155W, NP-CK4255X, NP-CK4155X, NP-CK4055X, NP-CM4150X, NP-CM4050X, NP-CK4155WG, NP-CK4255XG, NP-CK4155XG, NP-CR2165W, NP-CR2305X, NP-CR2275X, NP-CR2165X, NP-CR2155X, NP-CD2115X, NP-CD2105X, NP-CM4151X, NP-CR2276X, NP-CD2116X, NP-P502H, NP-P502W, NP-P452H, NP-P452W

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-15012: SQL Injection in code-projects Refugee Food Management System

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-15013: Stack-based Buffer Overflow in floooh sokol

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-15016: CWE-321 Use of Hard-coded Cryptographic Key in Ragic Enterprise Cloud Database

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats