Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23417: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-23417cvecve-2025-23417cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:23 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:05:50 UTC

Technical Analysis

CVE-2025-23417 identifies a denial of service (DoS) vulnerability in the Socomec DIRIS Digiware M-70 device, specifically in its implementation of Modbus RTU over TCP protocol in version 1.6.9. The root cause is a missing authentication mechanism (CWE-306) for critical functions, allowing unauthenticated attackers to send specially crafted network packets that trigger a DoS condition. This vulnerability enables an attacker to disrupt the availability of the device remotely without requiring any privileges or user interaction. The Modbus RTU over TCP protocol is commonly used in industrial control systems (ICS) and energy management for communication between devices. The lack of authentication means that any entity with network access to the device can exploit this flaw, potentially causing the device to crash or become unresponsive, leading to loss of monitoring and control capabilities. The CVSS v3.1 score of 8.6 (high) reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to impact on availability. While no public exploits are currently known, the vulnerability poses a significant risk to operational continuity in environments relying on this device. The absence of available patches necessitates reliance on compensating controls to mitigate risk. Given the device's role in critical infrastructure, exploitation could have cascading effects on industrial processes and energy distribution systems.

Potential Impact

The primary impact of CVE-2025-23417 is on the availability of the Socomec DIRIS Digiware M-70 device, which is used for energy monitoring and industrial control. A successful attack can cause denial of service, leading to loss of real-time monitoring and control data. For European organizations, especially those in energy production, manufacturing, and critical infrastructure sectors, this could result in operational disruptions, delayed response to system faults, and potential safety hazards. The inability to authenticate critical functions exposes these systems to remote attacks without any barriers, increasing the risk of targeted disruptions or opportunistic attacks. This could affect grid stability, industrial process efficiency, and compliance with regulatory requirements for operational continuity. The lack of confidentiality or integrity impact limits data theft or manipulation risks but does not diminish the severity of operational downtime. The threat is particularly relevant for organizations with network exposure of Modbus RTU over TCP devices or insufficient network segmentation, increasing the attack surface.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Socomec DIRIS Digiware M-70 devices from untrusted networks and limit access to only authorized management systems. 2. Deploy firewall rules and access control lists (ACLs) to restrict Modbus RTU over TCP traffic to known, trusted sources. 3. Monitor network traffic for anomalous or malformed Modbus packets that could indicate exploitation attempts. 4. Use virtual private networks (VPNs) or secure tunnels for remote access to the devices to prevent unauthorized network exposure. 5. Engage with Socomec for updates or patches addressing this vulnerability and apply them promptly once available. 6. Conduct regular security assessments and penetration testing focused on industrial protocols and device authentication mechanisms. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned for Modbus protocol anomalies. 8. Maintain an incident response plan that includes procedures for handling denial of service events impacting critical industrial devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-01-22T19:55:47.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db926f910530b0eb07232

Added to database: 12/1/2025, 3:49:58 PM

Last enriched: 12/8/2025, 5:05:50 PM

Last updated: 1/18/2026, 11:44:11 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats