Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54850: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-54850cvecve-2025-54850cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:13 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:05:31 UTC

Technical Analysis

CVE-2025-54850 identifies a denial of service (DoS) vulnerability in the Socomec DIRIS Digiware M-70 power monitoring device, specifically version 1.6.9. The vulnerability stems from a missing authentication mechanism on critical Modbus TCP and Modbus RTU over TCP functions, which are used for device configuration and management. An attacker can exploit this by sending a carefully crafted sequence of unauthenticated Modbus Write Single Register (function code 6) messages to TCP port 503. The attack sequence involves writing a value of 1000 to register 58112 to signal an impending configuration change, then setting a new Modbus address in register 29440, and finally committing the change by writing 161 to register 57856. This sequence causes the device to enter a denial-of-service state, effectively disabling its functionality. The vulnerability does not require any privileges or user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function). No patches or known exploits are currently reported, but the lack of authentication on critical functions presents a significant risk to operational continuity in environments using this device.

Potential Impact

The primary impact of CVE-2025-54850 is a complete denial of service on the Socomec DIRIS Digiware M-70 device, which is widely used for power monitoring and energy management in industrial and critical infrastructure settings. For European organizations, this could lead to loss of visibility into power consumption and electrical parameters, potentially disrupting energy management, operational efficiency, and safety monitoring. In critical infrastructure sectors such as manufacturing, utilities, data centers, and transportation, this loss of monitoring capability could delay incident detection and response, increasing the risk of cascading failures or safety incidents. Since the attack requires no authentication and can be launched remotely, it significantly raises the threat level, especially in environments where these devices are accessible from less secure network segments or exposed to external networks. The unavailability of these devices could also impact compliance with regulatory requirements for energy monitoring and reporting in Europe. While confidentiality and integrity are not directly affected, the availability impact alone can cause operational disruptions and financial losses.

Mitigation Recommendations

To mitigate CVE-2025-54850, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by implementing firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2) Employ network intrusion detection or anomaly detection systems tuned to identify unusual Modbus Write Single Register commands, especially those targeting registers 58112, 29440, and 57856. 3) Disable or restrict Modbus TCP and Modbus RTU over TCP functionality if not required for operational purposes. 4) Use VPNs or secure tunnels for any remote management access to these devices to ensure authentication and encryption. 5) Engage with Socomec support channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6) Conduct regular audits of device configurations and network access controls to ensure compliance with security policies. 7) Train operational technology (OT) and IT security teams to recognize and respond to potential exploitation attempts targeting Modbus protocols. These steps go beyond generic advice by focusing on protocol-specific controls and operational practices tailored to the affected device and its environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-07-31T15:17:58.545Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db927f910530b0eb07240

Added to database: 12/1/2025, 3:49:59 PM

Last enriched: 12/1/2025, 4:05:31 PM

Last updated: 12/4/2025, 6:00:22 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats