Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48882: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2024-48882cvecve-2024-48882cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:32 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:04:39 UTC

Technical Analysis

CVE-2024-48882 identifies a denial of service (DoS) vulnerability in the Socomec DIRIS Digiware M-70 device, specifically in its Modbus TCP communication interface. The root cause is a missing authentication mechanism (CWE-306) for critical functions, allowing unauthenticated attackers to send specially crafted Modbus TCP packets that cause the device to crash or become unresponsive. The affected version is 1.6.9. The vulnerability has a CVSS v3.1 score of 8.6, reflecting high severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) indicating that the impact extends beyond the vulnerable component. The impact is limited to availability (A:H), with no confidentiality or integrity loss. The device is commonly used in industrial power monitoring and energy management systems, where continuous availability is critical. Exploitation can be performed remotely without authentication, increasing the risk of disruption. No patches or exploits are currently reported, but the vulnerability poses a significant risk to operational continuity. The lack of authentication on Modbus TCP is a critical design flaw that can be exploited by attackers to disrupt monitoring and control systems, potentially leading to cascading failures in industrial environments.

Potential Impact

For European organizations, especially those in industrial, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk to operational availability. The DIRIS Digiware M-70 is used for power monitoring and energy management, so a denial of service could lead to loss of visibility into power consumption and potential failure to detect power anomalies or faults. This can disrupt industrial processes, cause downtime, and impact energy efficiency initiatives. In critical infrastructure environments such as utilities or data centers, such disruptions could have broader implications, including safety risks and regulatory non-compliance. The ease of exploitation without authentication means that attackers could launch DoS attacks from within the network or potentially from external sources if the device is exposed. This could lead to operational interruptions, financial losses, and reputational damage. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Immediately isolate DIRIS Digiware M-70 devices from untrusted networks and restrict Modbus TCP traffic to trusted management networks only. 2. Implement strict network segmentation and firewall rules to block unauthorized access to Modbus TCP ports (typically port 502). 3. Monitor network traffic for unusual or malformed Modbus packets that could indicate exploitation attempts. 4. Engage with Socomec support to obtain firmware updates or patches addressing this vulnerability as they become available. 5. If patching is not immediately possible, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for Modbus protocol misuse. 6. Conduct regular security assessments of industrial control systems to identify and remediate similar authentication weaknesses. 7. Train operational technology (OT) personnel on the risks of unauthenticated protocols and the importance of network controls. 8. Maintain an inventory of all devices running DIRIS Digiware M-70 and verify their firmware versions to prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-11-27T17:05:13.798Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db924f910530b0eb071e6

Added to database: 12/1/2025, 3:49:56 PM

Last enriched: 12/8/2025, 5:04:39 PM

Last updated: 1/18/2026, 11:02:11 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats