CVE-2024-49572: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service and weaken credentials resulting in default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2024-49572 is a vulnerability identified in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9, which is used for energy monitoring and management. The flaw resides in the Modbus TCP communication protocol implementation, where a critical function lacks proper authentication (classified under CWE-306: Missing Authentication for Critical Function). An attacker can exploit this by sending a specially crafted network packet without any authentication or user interaction, causing a denial of service (DoS) condition. More critically, this exploit weakens the device's credential mechanism, causing it to revert to default documented credentials, which are publicly known and easily exploitable. This scenario allows an attacker to gain unauthorized access to the device, compromising confidentiality and integrity of the system. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. Although no known exploits are currently reported in the wild, the potential for abuse is significant given the device’s role in industrial and energy management systems. The CVSS v3.1 score of 7.2 reflects high severity due to the ease of exploitation (network vector, no privileges, no user interaction) and the impact on confidentiality and integrity, though availability impact is limited to DoS. The vulnerability’s scope is considered changed (S:C) because the exploit affects the device’s security posture beyond the immediate function. No patches have been linked yet, indicating that affected organizations must rely on mitigation strategies until an official fix is released.
Potential Impact
For European organizations, the impact of CVE-2024-49572 can be substantial, especially those operating in critical infrastructure sectors such as energy, manufacturing, and industrial automation where Socomec DIRIS Digiware M-70 devices are deployed. The denial of service can disrupt monitoring and control operations, potentially leading to operational inefficiencies or safety risks. More importantly, the fallback to default credentials exposes these devices to unauthorized access, enabling attackers to manipulate energy data, disrupt operations, or pivot to other network segments. This can lead to data breaches, operational downtime, and regulatory non-compliance under frameworks like NIS2 and GDPR if sensitive operational data is compromised. The vulnerability’s network-based exploitability means attackers can target devices remotely, increasing the attack surface. The lack of authentication for critical functions undermines trust in device security and can facilitate lateral movement within industrial control networks. Given the increasing digitization of European energy and industrial sectors, this vulnerability poses a risk to operational continuity and data integrity.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately isolate Socomec DIRIS Digiware M-70 devices from untrusted networks by enforcing strict network segmentation and firewall rules to restrict Modbus TCP traffic only to authorized management stations. 2) Deploy network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous or malformed Modbus TCP packets indicative of exploitation attempts. 3) Change default credentials on all devices and enforce strong, unique passwords even if the device reverts to defaults after an incident. 4) Monitor device logs and network traffic for signs of unauthorized access or DoS conditions. 5) Engage with Socomec support to obtain firmware updates or patches as soon as they become available and plan for timely deployment. 6) Implement multi-factor authentication and additional access controls on management interfaces where possible. 7) Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar vulnerabilities proactively. 8) Educate operational technology (OT) staff about this vulnerability and the importance of network hygiene and access restrictions.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland
CVE-2024-49572: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
Description
A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service and weaken credentials resulting in default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-49572 is a vulnerability identified in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9, which is used for energy monitoring and management. The flaw resides in the Modbus TCP communication protocol implementation, where a critical function lacks proper authentication (classified under CWE-306: Missing Authentication for Critical Function). An attacker can exploit this by sending a specially crafted network packet without any authentication or user interaction, causing a denial of service (DoS) condition. More critically, this exploit weakens the device's credential mechanism, causing it to revert to default documented credentials, which are publicly known and easily exploitable. This scenario allows an attacker to gain unauthorized access to the device, compromising confidentiality and integrity of the system. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. Although no known exploits are currently reported in the wild, the potential for abuse is significant given the device’s role in industrial and energy management systems. The CVSS v3.1 score of 7.2 reflects high severity due to the ease of exploitation (network vector, no privileges, no user interaction) and the impact on confidentiality and integrity, though availability impact is limited to DoS. The vulnerability’s scope is considered changed (S:C) because the exploit affects the device’s security posture beyond the immediate function. No patches have been linked yet, indicating that affected organizations must rely on mitigation strategies until an official fix is released.
Potential Impact
For European organizations, the impact of CVE-2024-49572 can be substantial, especially those operating in critical infrastructure sectors such as energy, manufacturing, and industrial automation where Socomec DIRIS Digiware M-70 devices are deployed. The denial of service can disrupt monitoring and control operations, potentially leading to operational inefficiencies or safety risks. More importantly, the fallback to default credentials exposes these devices to unauthorized access, enabling attackers to manipulate energy data, disrupt operations, or pivot to other network segments. This can lead to data breaches, operational downtime, and regulatory non-compliance under frameworks like NIS2 and GDPR if sensitive operational data is compromised. The vulnerability’s network-based exploitability means attackers can target devices remotely, increasing the attack surface. The lack of authentication for critical functions undermines trust in device security and can facilitate lateral movement within industrial control networks. Given the increasing digitization of European energy and industrial sectors, this vulnerability poses a risk to operational continuity and data integrity.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately isolate Socomec DIRIS Digiware M-70 devices from untrusted networks by enforcing strict network segmentation and firewall rules to restrict Modbus TCP traffic only to authorized management stations. 2) Deploy network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous or malformed Modbus TCP packets indicative of exploitation attempts. 3) Change default credentials on all devices and enforce strong, unique passwords even if the device reverts to defaults after an incident. 4) Monitor device logs and network traffic for signs of unauthorized access or DoS conditions. 5) Engage with Socomec support to obtain firmware updates or patches as soon as they become available and plan for timely deployment. 6) Implement multi-factor authentication and additional access controls on management interfaces where possible. 7) Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar vulnerabilities proactively. 8) Educate operational technology (OT) staff about this vulnerability and the importance of network hygiene and access restrictions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-11-27T17:03:59.716Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692db924f910530b0eb071ee
Added to database: 12/1/2025, 3:49:56 PM
Last enriched: 12/8/2025, 5:05:09 PM
Last updated: 1/18/2026, 3:02:00 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1122: SQL Injection in Yonyou KSOA
MediumCVE-2026-1121: SQL Injection in Yonyou KSOA
MediumCVE-2026-1120: SQL Injection in Yonyou KSOA
MediumCVE-2026-1119: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.