Cyber Posture

CVE-2025-15103

High

Published: 30 December 2025

Published
30 December 2025
Modified
06 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15103 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Deltaww Dvp-12Se11T Firmware. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 mandates secure management and protection of authenticators like passwords against unauthorized disclosure, directly preventing vulnerabilities involving partial password exposure.

prevent

IA-6 requires obscuring authentication feedback to avoid revealing partial authentication information, comprehensively mitigating authentication bypass via partial password disclosure.

detect

AU-13 enables monitoring of system communications and error messages for unauthorized disclosure of sensitive information such as partial passwords, allowing early detection of exploitation attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote unauthenticated attackers to bypass authentication on a network-exposed industrial device via exploitation, directly mapping to T1190 (Exploit Public-Facing Application).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

DVP-12SE11T - Authentication Bypass via Partial Password Disclosure

Deeper analysisAI

CVE-2025-15103 is an authentication bypass vulnerability caused by partial password disclosure in the DVP-12SE11T device from Delta. Published on 2025-12-30, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Remote unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation enables authentication bypass, resulting in high impacts to confidentiality, integrity, and availability of the affected device.

Delta's security advisory PCSA-2025-00022 addresses this vulnerability along with others in the DVP-12SE11T and is available at https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00022_DVP-12SE11T%20Multiple%20Vulnerabilities.pdf.

Details

CWE(s)

Affected Products

deltaww
dvp-12se11t firmware
≤ 2.16

CVEs Like This One

CVE-2026-1951Same vendor: Deltaww
CVE-2025-62582Same vendor: Deltaww
CVE-2026-1950Same vendor: Deltaww
CVE-2026-1952Same vendor: Deltaww
CVE-2026-1949Same vendor: Deltaww
CVE-2025-62581Same vendor: Deltaww
CVE-2025-22828Shared CWE-200
CVE-2026-40584Shared CWE-200
CVE-2026-22237Shared CWE-200
CVE-2023-24011Shared CWE-200

References