Delinea Secret Server on-prem RPC Password Rotation authentication vulnerability - CVE-2025-12810

Trust Center

ControlK

Security is built into our bones
Delinea’s Privileged Access Management solutions are built with security as a foundation from the start. We adhere to industry standards and frameworks, and ensure security testing is performed as a critical component of our software development processes along with continuous Quality Assurance (QA) checks.

Our cybersecurity defense measures address key components, including intrusion detection, Distributed denial-of-service (DDoS) attack prevention, penetration testing, behavioral analytics, anomaly detection, machine learning, and Security Operations Center. We also monitor and protect against critical web application security risks incorporating OWASP Top 10 and Automated Top 20 threats.

Encryption assured for data in transit and at rest
Customer data is fully isolated and encrypted both in transit and at rest, using the AES-256 standard encryption algorithm and PBKDF2-HMAC-SHA256 hashing algorithm. Delinea uses private encryption keys for each customer, with third-party key management support (AWS KMS). Secrets are systematically “salted” before being hashed and encrypted with their own unique Initialization Vector and Key.

Connections to Delinea cloud services are protected via Transport Layer Security (TLS). Distributed Engine communications are also secured with an additional encryption key unique to each tenant.

Documents

DOCUMENTS2024 CAIQ
Data Processing Addendum (DPA)
EU – US Data Privacy Framework (DPF)
Privacy Policy
View more
Trust Center Updates

Delinea Secret Server on-prem RPC Password Rotation authentication vulnerability - CVE-2025-12810

Copy link
Vulnerabilities

Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules).

This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25.
A secret with "change password on check in" enabled automatically checks in even when the password change fails after reaching its retry limit. This leaves the secret in an inconsistent state with the wrong password.

Affected Product and Version

Delinea Secret Server on-prem versions 11.8.1, 11.9.6, and 11.9.25

Resolution

Upgrade to Secret Server version 11.9.47 or later

The secret will remain checked out when the password change fails.

CVE Details

  • CVE ID: CVE-2025-12810
  • Published Date: January 27, 2026
  • Vulnerability Type: Improper Authentication
  • CWE: 287
  • CVSS v4.0 Score: 5.3
  • CVSS v4.0 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:A

Delinea Platform achieves PCI-DSS compliance

Compliance

Delinea Platform has achieved PCI DSS 4.0.1 compliance, ensuring adherence to industry-recognized security requirements for payment data. Supporting documentation can be found by clicking on PCI-DSS in the Compliance section.

Assessment of recently-announced Critical Vulnerabilities in React and Next.js (CVE-2025-55182 and CVE-2025-66478)

Vulnerabilities

Delinea has reviewed the recently announced React and Next.js critical vulnerabilities (CVE-2025-55182 and CVE-2025-66478) and has determined that Delinea products are not impacted. Delinea will continue to monitor and assess the vulnerabilities as new updates become available and will provide further communications if our disposition changes.

Gainsight Security Notification

Vulnerabilities

Delinea has reviewed the recently announced Gainsight compromise and has confirmed that Delinea has not been impacted. Delinea will continue to monitor and assess this vulnerability as new updates become available and will provide further communications if our disposition changes.

If you have questions, please contact your Customer Success Manager, Engagement Manager, or Partner Manager. Please subscribe to the Delinea Trust Center for future security and other important announcements.

BRICKSTORM Malware Notification

Vulnerabilities

Delinea is aware of recent reports concerning the BRICKSTORM malware strain being used to steal privileged credentials to gain access to sensitive systems such as Delinea Secret Server and move laterally to additional systems. To be clear, this is not a vulnerability in Delinea products. Threat actors are constantly evolving their tactics, which is why we continuously monitor the landscape and update our defenses to help protect our customers. We also encourage all organizations to remain vigilant and follow security best practices, as layered defenses are critical in today's environment.

If you have questions, please contact your Customer Success Manager, Engagement Manager, or Partner Manager. Please subscribe to the Delinea Trust Center for future security and other important announcements.

If you need help using this Trust Center, please contact us.
Contact support
If you think you may have discovered a vulnerability, please send us a note.
Report issue