DVP-12SE11T - Password Protection Bypass
Advisories

No advisories yet.

Fixes

Solution

Users are advised to implement robust network-level countermeasures in accordance with industry best practices for security. We recommend that users take the following security precautions: > Utilize the Product's IP Whitelisting Feature: Employ the device's built-in IP whitelisting function to restrict Modbus/TCP access solely to known, trusted client IP addresses. > Implement Network Segmentation: Ensure the product is placed within a highly segregated zone > Utilize industrial firewalls to monitor Modbus/TCP traffic


Workaround

No workaround given by the vendor.

History

Tue, 30 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
Description DVP-12SE11T - Password Protection Bypass
Title DVP-12SE11T - Password Protection Bypass
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Deltaww

Published:

Updated: 2025-12-30T15:57:12.209Z

Reserved: 2025-12-26T03:25:49.157Z

Link: CVE-2025-15102

cve-icon Vulnrichment

Updated: 2025-12-30T15:55:49.852Z

cve-icon NVD

Status : Received

Published: 2025-12-30T09:15:52.157

Modified: 2025-12-30T09:15:52.157

Link: CVE-2025-15102

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses