Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-54850cvecve-2025-54850cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:13 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:07:10 UTC

Technical Analysis

CVE-2025-54850 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Socomec DIRIS Digiware M-70 version 1.6.9. The device implements Modbus TCP and Modbus RTU over TCP protocols for communication and control, specifically listening on port 503. The vulnerability allows an unauthenticated attacker to send a carefully crafted sequence of Modbus RTU over TCP messages using the Write Single Register function code (6) to manipulate device configuration registers. The attack sequence involves writing a value of 1000 to register 58112 to indicate an impending configuration change, followed by writing a new Modbus address to register 29440, and finally committing the change by writing 161 to register 57856. This sequence triggers a denial-of-service (DoS) condition, causing the device to become unresponsive and unavailable. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, no privileges required, no user interaction, and a high impact on availability, while confidentiality and integrity remain unaffected. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date. The device is typically used in industrial and energy management contexts, where availability is critical for operational continuity.

Potential Impact

The primary impact of CVE-2025-54850 is a denial of service condition that renders the Socomec DIRIS Digiware M-70 device unavailable. For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities, this can lead to significant operational disruptions. Loss of availability in power monitoring and management devices can cause failures in energy distribution oversight, delayed fault detection, and potential cascading effects on industrial control systems. This may result in financial losses, safety hazards, and regulatory non-compliance. Since the attack requires no authentication and can be executed remotely, the risk of exploitation by malicious actors or automated scanning tools is elevated. The lack of confidentiality and integrity impact means data leakage or manipulation is not a concern, but the operational continuity and reliability of critical infrastructure are at stake. Organizations relying on this device must consider the potential for targeted attacks or accidental disruptions caused by misconfigured network traffic.

Mitigation Recommendations

To mitigate CVE-2025-54850, European organizations should implement network-level protections such as firewall rules to restrict access to port 503 (Modbus TCP) only to trusted management networks and authorized personnel. Employ network segmentation to isolate industrial control devices from general IT networks and the internet. Monitor network traffic for unusual Modbus RTU over TCP Write Single Register requests, especially targeting registers 58112, 29440, and 57856, to detect potential exploitation attempts. Since no official patches are currently available, coordinate with Socomec for firmware updates or advisories. Consider deploying intrusion detection/prevention systems (IDS/IPS) with Modbus protocol awareness to block suspicious sequences. Implement strict access control policies and use VPNs or secure tunnels for remote management to reduce exposure. Regularly audit device configurations and logs to identify unauthorized changes. Finally, develop incident response plans specific to industrial control system DoS scenarios to minimize downtime and recovery time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-07-31T15:17:58.545Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db927f910530b0eb07240

Added to database: 12/1/2025, 3:49:59 PM

Last enriched: 12/8/2025, 5:07:10 PM

Last updated: 1/19/2026, 7:54:39 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats