Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE

0
High
VulnerabilityCVE-2025-62578cvecve-2025-62578cwe-319
Published: Fri Dec 26 2025 (12/26/2025, 06:05:01 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: DVP-12SE

Description

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

AI-Powered Analysis

AILast updated: 12/26/2025, 06:23:35 UTC

Technical Analysis

CVE-2025-62578 identifies a vulnerability in the Delta Electronics DVP-12SE PLC, specifically related to the Modbus/TCP protocol implementation. The issue is categorized under CWE-319, which concerns the cleartext transmission of sensitive information. In this case, the DVP-12SE transmits sensitive control and operational data without encryption, allowing an attacker with network access to eavesdrop on communications. The vulnerability does not require authentication or user interaction, making it easier to exploit in environments where the attacker can access the industrial network or a bridged network segment. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the attack vector is adjacent network, with low attack complexity, no privileges or user interaction needed, and high impact on integrity and availability, but low impact on confidentiality. This suggests that while the data is transmitted in cleartext, the primary risk is manipulation or disruption of control commands and operational data, which can lead to process disruption or damage. The vulnerability is significant in industrial control systems (ICS) environments where Modbus/TCP is widely used for communication between PLCs and supervisory systems. The absence of encryption or secure authentication mechanisms in the protocol implementation makes it vulnerable to man-in-the-middle (MITM) attacks, replay attacks, or data interception. No patches are currently available, and no exploits have been reported in the wild, but the potential impact on critical infrastructure is high. Organizations relying on DVP-12SE PLCs should prioritize network security controls and monitoring to mitigate risk until a vendor patch is released.

Potential Impact

The vulnerability poses a significant risk to European organizations operating industrial control systems using Delta Electronics DVP-12SE PLCs. The cleartext transmission of sensitive data can lead to interception and manipulation of control commands, potentially causing operational disruptions, safety hazards, or damage to physical equipment. This is particularly critical for sectors such as manufacturing, energy production, water treatment, and transportation, where PLCs play a central role in process automation. The integrity and availability impacts are high, as attackers could alter commands or disrupt communications, leading to process failures or unsafe conditions. Confidentiality impact is rated low to moderate since the data is transmitted in cleartext, but the primary concern is the potential for unauthorized command injection or disruption. The vulnerability could also facilitate lateral movement within industrial networks if attackers gain initial access. European organizations with interconnected IT and OT networks are especially vulnerable if proper segmentation and security controls are not in place. The absence of authentication and encryption increases the attack surface, making it easier for threat actors to exploit this weakness remotely within the local network or via compromised devices.

Mitigation Recommendations

Since no patches are currently available for CVE-2025-62578, European organizations should implement compensating controls to reduce risk. First, network segmentation should be enforced to isolate industrial control networks from corporate IT networks and the internet, limiting attacker access to Modbus/TCP traffic. Deploying firewalls and access control lists (ACLs) to restrict Modbus traffic only to authorized devices is critical. Use VPNs or secure tunneling protocols (e.g., IPsec) to encrypt Modbus communications where possible, mitigating the cleartext transmission issue. Implement network intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tailored for Modbus traffic to detect suspicious activity. Regularly monitor network traffic for unexpected Modbus commands or unusual patterns indicative of MITM or replay attacks. Conduct thorough asset inventories to identify all DVP-12SE devices and ensure they are physically secured. Train operational technology (OT) personnel on the risks of cleartext protocols and the importance of network hygiene. Engage with Delta Electronics for updates on patches or firmware upgrades addressing this vulnerability. Finally, consider deploying protocol gateways or security appliances that provide encryption and authentication for legacy industrial protocols.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Deltaww
Date Reserved
2025-10-16T01:07:48.958Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694e29d4f3b146189c00bac9

Added to database: 12/26/2025, 6:23:16 AM

Last enriched: 12/26/2025, 6:23:35 AM

Last updated: 12/26/2025, 8:32:57 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats