CVE-2025-14591

7.5 HIGH

📋 TL;DR

In Delphix Continuous Compliance 2025.3.0+, incorrect End-of-Record (EOR) configuration for delimited files can cause parsing errors that leave personally identifiable information (PII) unmasked. This affects organizations using Delphix for data masking/compliance who process delimited files with CR+LF line endings. The vulnerability exposes sensitive data that should be masked according to compliance policies.

💻 Affected Systems

Products:
  • Delphix Continuous Compliance
Versions: 2025.3.0 and later
Operating Systems: All platforms running Delphix Continuous Compliance
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects delimited files using CR+LF (Windows/DOS) line endings. The vulnerability was introduced as part of a bug fix to properly handle these EOR characters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full exposure of PII data (SSNs, credit cards, medical records) that should be masked, leading to data breach, regulatory fines, and reputational damage.

🟠

Likely Case

Partial PII exposure in delimited files with CR+LF endings, potentially violating GDPR, HIPAA, PCI-DSS, or other compliance requirements.

🟢

If Mitigated

Limited exposure if proper access controls and monitoring are in place, but compliance violations may still occur.

🌐 Internet-Facing: MEDIUM - If Delphix interfaces are internet-accessible, attackers could potentially access unmasked PII through exposed APIs or interfaces.
🏢 Internal Only: HIGH - Internal users or compromised accounts could access unmasked PII through normal Delphix operations, especially if they have access to data export or reporting features.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Delphix Continuous Compliance and knowledge of the incorrect EOR configuration. Attackers would need to either configure the system incorrectly or identify existing misconfigurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://portal.perforce.com/s/cve/a91Qi000002fThdIAE/pii-leak-due-to-change-in-eor-handling

Restart Required: Yes

Instructions:

1. Review vendor advisory for patched version. 2. Backup current configuration. 3. Apply vendor-provided patch or upgrade to fixed version. 4. Restart Delphix services. 5. Verify EOR configurations for all delimited file sources.

🔧 Temporary Workarounds

Reconfigure EOR Settings

all

Manually verify and correct End-of-Record configurations for all delimited file sources to ensure proper parsing

# Check current EOR configurations in Delphix Continuous Compliance
# Update EOR settings via Delphix CLI or GUI for affected data sources

Disable Delimited File Processing

all

Temporarily disable processing of delimited files with CR+LF endings until patched

# Identify and pause data sources using delimited files with CR+LF
# Use Delphix management interface to suspend affected data operations

🧯 If You Can't Patch

  • Implement strict access controls to limit who can view or export data from Delphix Continuous Compliance
  • Enable enhanced logging and monitoring for data access patterns, particularly for delimited file exports

🔍 How to Verify

Check if Vulnerable:

Check Delphix version (must be 2025.3.0+) and review EOR configurations for delimited file sources, particularly those using CR+LF line endings.

Check Version:

delphix version or check via Delphix administration interface

Verify Fix Applied:

After patching, test with sample delimited files containing CR+LF endings and PII data to ensure proper masking occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data export patterns
  • Access to delimited file sources with CR+LF endings
  • Configuration changes to EOR settings

Network Indicators:

  • Increased data transfer from Delphix systems
  • Unusual API calls to data export endpoints

SIEM Query:

source="delphix" AND (event_type="data_export" OR event_type="configuration_change") AND (file_type="delimited" OR eor_config="CR+LF")

🔗 References

📤 Share & Export