CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.
AI Analysis
Technical Summary
CVE-2025-54850 identifies a denial of service (DoS) vulnerability in the Socomec DIRIS Digiware M-70 power monitoring device, specifically version 1.6.9. The vulnerability stems from a missing authentication mechanism on critical Modbus TCP and Modbus RTU over TCP functions, which are used for device configuration and management. An attacker can exploit this by sending a carefully crafted sequence of unauthenticated Modbus Write Single Register (function code 6) messages to TCP port 503. The attack sequence involves writing a value of 1000 to register 58112 to signal an impending configuration change, then setting a new Modbus address in register 29440, and finally committing the change by writing 161 to register 57856. This sequence causes the device to enter a denial-of-service state, effectively disabling its functionality. The vulnerability does not require any privileges or user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function). No patches or known exploits are currently reported, but the lack of authentication on critical functions presents a significant risk to operational continuity in environments using this device.
Potential Impact
The primary impact of CVE-2025-54850 is a complete denial of service on the Socomec DIRIS Digiware M-70 device, which is widely used for power monitoring and energy management in industrial and critical infrastructure settings. For European organizations, this could lead to loss of visibility into power consumption and electrical parameters, potentially disrupting energy management, operational efficiency, and safety monitoring. In critical infrastructure sectors such as manufacturing, utilities, data centers, and transportation, this loss of monitoring capability could delay incident detection and response, increasing the risk of cascading failures or safety incidents. Since the attack requires no authentication and can be launched remotely, it significantly raises the threat level, especially in environments where these devices are accessible from less secure network segments or exposed to external networks. The unavailability of these devices could also impact compliance with regulatory requirements for energy monitoring and reporting in Europe. While confidentiality and integrity are not directly affected, the availability impact alone can cause operational disruptions and financial losses.
Mitigation Recommendations
To mitigate CVE-2025-54850, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by implementing firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2) Employ network intrusion detection or anomaly detection systems tuned to identify unusual Modbus Write Single Register commands, especially those targeting registers 58112, 29440, and 57856. 3) Disable or restrict Modbus TCP and Modbus RTU over TCP functionality if not required for operational purposes. 4) Use VPNs or secure tunnels for any remote management access to these devices to ensure authentication and encryption. 5) Engage with Socomec support channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6) Conduct regular audits of device configurations and network access controls to ensure compliance with security policies. 7) Train operational technology (OT) and IT security teams to recognize and respond to potential exploitation attempts targeting Modbus protocols. These steps go beyond generic advice by focusing on protocol-specific controls and operational practices tailored to the affected device and its environment.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Spain, Poland, Sweden, Finland
CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
Description
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.
AI-Powered Analysis
Technical Analysis
CVE-2025-54850 identifies a denial of service (DoS) vulnerability in the Socomec DIRIS Digiware M-70 power monitoring device, specifically version 1.6.9. The vulnerability stems from a missing authentication mechanism on critical Modbus TCP and Modbus RTU over TCP functions, which are used for device configuration and management. An attacker can exploit this by sending a carefully crafted sequence of unauthenticated Modbus Write Single Register (function code 6) messages to TCP port 503. The attack sequence involves writing a value of 1000 to register 58112 to signal an impending configuration change, then setting a new Modbus address in register 29440, and finally committing the change by writing 161 to register 57856. This sequence causes the device to enter a denial-of-service state, effectively disabling its functionality. The vulnerability does not require any privileges or user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function). No patches or known exploits are currently reported, but the lack of authentication on critical functions presents a significant risk to operational continuity in environments using this device.
Potential Impact
The primary impact of CVE-2025-54850 is a complete denial of service on the Socomec DIRIS Digiware M-70 device, which is widely used for power monitoring and energy management in industrial and critical infrastructure settings. For European organizations, this could lead to loss of visibility into power consumption and electrical parameters, potentially disrupting energy management, operational efficiency, and safety monitoring. In critical infrastructure sectors such as manufacturing, utilities, data centers, and transportation, this loss of monitoring capability could delay incident detection and response, increasing the risk of cascading failures or safety incidents. Since the attack requires no authentication and can be launched remotely, it significantly raises the threat level, especially in environments where these devices are accessible from less secure network segments or exposed to external networks. The unavailability of these devices could also impact compliance with regulatory requirements for energy monitoring and reporting in Europe. While confidentiality and integrity are not directly affected, the availability impact alone can cause operational disruptions and financial losses.
Mitigation Recommendations
To mitigate CVE-2025-54850, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by implementing firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2) Employ network intrusion detection or anomaly detection systems tuned to identify unusual Modbus Write Single Register commands, especially those targeting registers 58112, 29440, and 57856. 3) Disable or restrict Modbus TCP and Modbus RTU over TCP functionality if not required for operational purposes. 4) Use VPNs or secure tunnels for any remote management access to these devices to ensure authentication and encryption. 5) Engage with Socomec support channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6) Conduct regular audits of device configurations and network access controls to ensure compliance with security policies. 7) Train operational technology (OT) and IT security teams to recognize and respond to potential exploitation attempts targeting Modbus protocols. These steps go beyond generic advice by focusing on protocol-specific controls and operational practices tailored to the affected device and its environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-31T15:17:58.545Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692db927f910530b0eb07240
Added to database: 12/1/2025, 3:49:59 PM
Last enriched: 12/1/2025, 4:05:31 PM
Last updated: 12/4/2025, 6:00:22 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.