CVE-2025-62578

7.5 HIGH

📋 TL;DR

The DVP-12SE programmable logic controller transmits sensitive information in cleartext over Modbus/TCP, allowing attackers on the same network to intercept and read data. This affects industrial control systems using Delta Electronics DVP-12SE devices with Modbus/TCP enabled.

💻 Affected Systems

Products:
  • Delta Electronics DVP-12SE Programmable Logic Controller
Versions: All versions with Modbus/TCP functionality
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when Modbus/TCP is enabled, which is common in industrial deployments for SCADA communication.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept sensitive industrial process data, modify control commands, or cause physical damage to equipment by manipulating cleartext transmissions.

🟠

Likely Case

Unauthorized monitoring of industrial process data, potential data theft, and reconnaissance for further attacks.

🟢

If Mitigated

Limited to internal network exposure with proper segmentation; external attackers cannot access cleartext data.

🌐 Internet-Facing: HIGH if devices are directly exposed to the internet without proper network controls.
🏢 Internal Only: MEDIUM as attackers would need internal network access, but industrial networks often have flat architectures.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to Modbus/TCP port (default 502) and ability to sniff or intercept traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00021_DVP-12SE%20ModbusTCP%20Cleartext%20Transmission%20of%20Sensitive%20Info.pdf

Restart Required: No

Instructions:

No firmware patch available. Implement network-level controls and workarounds as described in vendor advisory.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DVP-12SE devices in separate VLANs with strict firewall rules limiting Modbus/TCP access.

VPN Tunnel

all

Encrypt Modbus/TCP traffic using site-to-site VPN between PLC and SCADA systems.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with DVP-12SE on port 502.
  • Deploy network monitoring and intrusion detection specifically for Modbus/TCP traffic anomalies.

🔍 How to Verify

Check if Vulnerable:

Use network sniffing tools (Wireshark, tcpdump) on the same network segment as DVP-12SE to capture Modbus/TCP traffic on port 502 and check for cleartext data.

Check Version:

Check device firmware version through Delta programming software or device web interface if available.

Verify Fix Applied:

Verify network segmentation prevents unauthorized access to port 502 and that VPN encryption is properly implemented for Modbus traffic.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to port 502
  • Multiple failed Modbus function code requests

Network Indicators:

  • Unencrypted Modbus/TCP traffic to/from DVP-12SE devices
  • Port scanning activity targeting port 502

SIEM Query:

source_port:502 OR dest_port:502 AND (protocol:"modbus" OR protocol:"tcp")

🔗 References

📤 Share & Export