Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20085: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-20085cvecve-2025-20085cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:28 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service and weaken credentials resulting in default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:07:13 UTC

Technical Analysis

CVE-2025-20085 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Socomec DIRIS Digiware M-70 firmware version 1.6.9. The flaw exists in the Modbus RTU over TCP implementation, a protocol commonly used in industrial control systems for communication between devices. An attacker can send a specially crafted network packet without any authentication to the device, triggering a denial of service condition. More critically, this exploit can weaken the device's credential protections, causing it to revert to default documented credentials. This effectively allows unauthorized access to the device, compromising confidentiality and integrity of the system. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The scope of impact is significant as the device is used in monitoring and controlling electrical distribution systems, where unauthorized access could lead to manipulation or disruption of critical infrastructure. Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized by attackers targeting industrial environments. The CVSS v3.1 base score of 7.2 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to credential weakening. The lack of available patches at the time of disclosure increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, especially those in energy, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation can lead to denial of service, disrupting monitoring and control operations, which may cause operational downtime or safety hazards. The weakening of credentials to default documented values increases the risk of unauthorized access, potentially allowing attackers to manipulate device settings or gather sensitive operational data. This can undermine the confidentiality and integrity of industrial control systems, potentially leading to broader network compromise or sabotage. Given the reliance on Modbus protocol in many European industrial environments, the vulnerability could affect a wide range of operational technology deployments. The impact is heightened in countries with extensive industrial automation and critical infrastructure networks, where such devices are integral to daily operations. Additionally, the lack of authentication enforcement may facilitate lateral movement within networks if attackers gain initial access, increasing the overall threat landscape.

Mitigation Recommendations

Immediate mitigation steps include isolating the affected DIRIS Digiware M-70 devices from untrusted networks and restricting Modbus RTU over TCP traffic to trusted management stations only. Network segmentation should be enforced to limit exposure of these devices to potential attackers. Implement strict firewall rules to block unauthorized access to the Modbus TCP port. Continuous monitoring and anomaly detection on Modbus traffic can help identify exploitation attempts early. Since no patches are currently available, organizations should engage with Socomec for updates and apply firmware updates promptly once released. Additionally, changing default credentials on all devices and enforcing strong authentication mechanisms where possible can reduce risk. Employing network intrusion detection systems (NIDS) with industrial protocol awareness can provide additional defense layers. Finally, conducting regular security assessments and penetration testing on industrial control systems will help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-01-22T19:55:34.239Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db924f910530b0eb071f9

Added to database: 12/1/2025, 3:49:56 PM

Last enriched: 12/1/2025, 4:07:13 PM

Last updated: 12/4/2025, 10:45:10 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats