DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information
Advisories

No advisories yet.

Fixes

Solution

Users are advised to implement robust network-level countermeasures in accordance with industry best practices for security. We recommend that users take the following security precautions: > Utilize the Product's IP Whitelisting Feature: Employ the device's built-in IP whitelisting function to restrict Modbus/TCP access solely to known, trusted client IP addresses. > Implement Network Segmentation: Ensure the product is placed within a highly segregated zone > Utilize industrial firewalls to monitor Modbus/TCP traffic


Workaround

No workaround given by the vendor.

History

Fri, 26 Dec 2025 06:15:00 +0000

Type Values Removed Values Added
Description DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information
Title DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Deltaww

Published:

Updated: 2025-12-26T06:05:01.035Z

Reserved: 2025-10-16T01:07:48.958Z

Link: CVE-2025-62578

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-26T06:15:39.980

Modified: 2025-12-26T06:15:39.980

Link: CVE-2025-62578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses