2025-12-26 6:5CVE-2025-62578Deltaww
PUBLISHED5.2CWE-319

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

Problem type

Affected products

Delta Electronics

DVP-12SE

<= * - AFFECTED

References

GitHub Security Advisories

GHSA-p8g3-7r42-x5c9

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

https://github.com/advisories/GHSA-p8g3-7r42-x5c9

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-62578
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-62578",
    "assignerOrgId": "759f5e80-c8e1-4224-bead-956d7b33c98b",
    "assignerShortName": "Deltaww",
    "dateUpdated": "2025-12-26T15:53:17.972Z",
    "dateReserved": "2025-10-16T01:07:48.958Z",
    "datePublished": "2025-12-26T06:05:01.035Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "759f5e80-c8e1-4224-bead-956d7b33c98b",
        "shortName": "Deltaww",
        "dateUpdated": "2025-12-26T06:05:01.035Z"
      },
      "datePublic": "2025-12-26T05:30:00.000Z",
      "title": "DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information",
      "descriptions": [
        {
          "lang": "en",
          "value": "DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information<br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Delta Electronics",
          "product": "DVP-12SE",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "custom",
              "lessThanOrEqual": "*"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-319 Cleartext Transmission of Sensitive Information",
              "cweId": "CWE-319",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00021_DVP-12SE%20ModbusTCP%20Cleartext%20Transmission%20of%20Sensitive%20Info.pdf"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-157",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-157 Sniffing Attacks"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Users are advised to implement robust network-level countermeasures in accordance with industry best practices for security.\nWe recommend that users take the following security precautions:\n> Utilize the Product's IP Whitelisting Feature: Employ the device's built-in IP whitelisting function to restrict Modbus/TCP access solely to known, trusted client IP addresses.\n> Implement Network Segmentation: Ensure the product is placed within a highly segregated zone\n> Utilize industrial firewalls to monitor Modbus/TCP traffic",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Users are advised to implement robust network-level countermeasures in accordance with industry best practices for security.<br>We recommend that users take the following security precautions:<br>&gt; Utilize the Product's IP Whitelisting Feature: Employ the device's built-in IP whitelisting function to restrict Modbus/TCP access solely to known, trusted client IP addresses.<br>&gt; Implement Network Segmentation: Ensure the product is placed within a highly segregated zone<br>&gt; Utilize industrial firewalls to monitor Modbus/TCP traffic<br>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Praneeta Krishnaprasad Maganti of BITS Pilani, Hyderabad Campus",
          "type": "reporter"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-12-26T15:53:17.972Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}