CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.
AI Analysis
Technical Summary
CVE-2025-54850 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Socomec DIRIS Digiware M-70 version 1.6.9. The device implements Modbus TCP and Modbus RTU over TCP protocols for communication and control, specifically listening on port 503. The vulnerability allows an unauthenticated attacker to send a carefully crafted sequence of Modbus RTU over TCP messages using the Write Single Register function code (6) to manipulate device configuration registers. The attack sequence involves writing a value of 1000 to register 58112 to indicate an impending configuration change, followed by writing a new Modbus address to register 29440, and finally committing the change by writing 161 to register 57856. This sequence triggers a denial-of-service (DoS) condition, causing the device to become unresponsive and unavailable. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, no privileges required, no user interaction, and a high impact on availability, while confidentiality and integrity remain unaffected. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date. The device is typically used in industrial and energy management contexts, where availability is critical for operational continuity.
Potential Impact
The primary impact of CVE-2025-54850 is a denial of service condition that renders the Socomec DIRIS Digiware M-70 device unavailable. For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities, this can lead to significant operational disruptions. Loss of availability in power monitoring and management devices can cause failures in energy distribution oversight, delayed fault detection, and potential cascading effects on industrial control systems. This may result in financial losses, safety hazards, and regulatory non-compliance. Since the attack requires no authentication and can be executed remotely, the risk of exploitation by malicious actors or automated scanning tools is elevated. The lack of confidentiality and integrity impact means data leakage or manipulation is not a concern, but the operational continuity and reliability of critical infrastructure are at stake. Organizations relying on this device must consider the potential for targeted attacks or accidental disruptions caused by misconfigured network traffic.
Mitigation Recommendations
To mitigate CVE-2025-54850, European organizations should implement network-level protections such as firewall rules to restrict access to port 503 (Modbus TCP) only to trusted management networks and authorized personnel. Employ network segmentation to isolate industrial control devices from general IT networks and the internet. Monitor network traffic for unusual Modbus RTU over TCP Write Single Register requests, especially targeting registers 58112, 29440, and 57856, to detect potential exploitation attempts. Since no official patches are currently available, coordinate with Socomec for firmware updates or advisories. Consider deploying intrusion detection/prevention systems (IDS/IPS) with Modbus protocol awareness to block suspicious sequences. Implement strict access control policies and use VPNs or secure tunnels for remote management to reduce exposure. Regularly audit device configurations and logs to identify unauthorized changes. Finally, develop incident response plans specific to industrial control system DoS scenarios to minimize downtime and recovery time.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Spain, Poland, Sweden, Finland
CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
Description
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.
AI-Powered Analysis
Technical Analysis
CVE-2025-54850 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Socomec DIRIS Digiware M-70 version 1.6.9. The device implements Modbus TCP and Modbus RTU over TCP protocols for communication and control, specifically listening on port 503. The vulnerability allows an unauthenticated attacker to send a carefully crafted sequence of Modbus RTU over TCP messages using the Write Single Register function code (6) to manipulate device configuration registers. The attack sequence involves writing a value of 1000 to register 58112 to indicate an impending configuration change, followed by writing a new Modbus address to register 29440, and finally committing the change by writing 161 to register 57856. This sequence triggers a denial-of-service (DoS) condition, causing the device to become unresponsive and unavailable. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, no privileges required, no user interaction, and a high impact on availability, while confidentiality and integrity remain unaffected. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date. The device is typically used in industrial and energy management contexts, where availability is critical for operational continuity.
Potential Impact
The primary impact of CVE-2025-54850 is a denial of service condition that renders the Socomec DIRIS Digiware M-70 device unavailable. For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities, this can lead to significant operational disruptions. Loss of availability in power monitoring and management devices can cause failures in energy distribution oversight, delayed fault detection, and potential cascading effects on industrial control systems. This may result in financial losses, safety hazards, and regulatory non-compliance. Since the attack requires no authentication and can be executed remotely, the risk of exploitation by malicious actors or automated scanning tools is elevated. The lack of confidentiality and integrity impact means data leakage or manipulation is not a concern, but the operational continuity and reliability of critical infrastructure are at stake. Organizations relying on this device must consider the potential for targeted attacks or accidental disruptions caused by misconfigured network traffic.
Mitigation Recommendations
To mitigate CVE-2025-54850, European organizations should implement network-level protections such as firewall rules to restrict access to port 503 (Modbus TCP) only to trusted management networks and authorized personnel. Employ network segmentation to isolate industrial control devices from general IT networks and the internet. Monitor network traffic for unusual Modbus RTU over TCP Write Single Register requests, especially targeting registers 58112, 29440, and 57856, to detect potential exploitation attempts. Since no official patches are currently available, coordinate with Socomec for firmware updates or advisories. Consider deploying intrusion detection/prevention systems (IDS/IPS) with Modbus protocol awareness to block suspicious sequences. Implement strict access control policies and use VPNs or secure tunnels for remote management to reduce exposure. Regularly audit device configurations and logs to identify unauthorized changes. Finally, develop incident response plans specific to industrial control system DoS scenarios to minimize downtime and recovery time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-31T15:17:58.545Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692db927f910530b0eb07240
Added to database: 12/1/2025, 3:49:59 PM
Last enriched: 12/8/2025, 5:07:10 PM
Last updated: 1/19/2026, 7:54:39 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.