CVE-2025-54851: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state.
AI Analysis
Technical Summary
CVE-2025-54851 identifies a denial of service vulnerability in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9. The vulnerability stems from missing authentication controls on critical Modbus TCP and Modbus RTU over TCP functions. An attacker can remotely send a specially crafted Modbus TCP packet to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the device's Modbus address to 15, which disrupts normal communication and causes the device to enter a denial-of-service state, rendering it unresponsive. The attack requires no authentication or user interaction, making it trivially exploitable over the network. The vulnerability impacts availability (A:H) but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. No patches or exploits in the wild are currently reported, but the lack of authentication on critical functions represents a significant security weakness. The device is typically used in industrial and energy management environments for power monitoring and control, making availability critical. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function).
Potential Impact
For European organizations, the primary impact of this vulnerability is on the availability of power monitoring and management systems that rely on the Socomec DIRIS Digiware M-70 device. Disruption of these devices can lead to loss of visibility into power consumption, potential mismanagement of energy resources, and operational downtime in industrial, commercial, or critical infrastructure environments. This could affect manufacturing plants, data centers, utilities, and other sectors dependent on continuous power monitoring. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly impact operational continuity and safety systems that rely on accurate power data. Given the device's role in energy management, prolonged outages could lead to financial losses and regulatory compliance issues. The ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments where Modbus traffic is accessible from less secure network segments or exposed to external networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by applying firewall rules or network segmentation to isolate these devices from untrusted networks. 2) Employ network-level authentication or VPN tunnels to secure Modbus communications, preventing unauthorized access to critical functions. 3) Monitor network traffic for anomalous Modbus Write Single Register requests, especially those targeting register 4352 or unusual Modbus address changes. 4) Coordinate with Socomec for firmware updates or patches addressing this vulnerability; if unavailable, consider compensating controls such as disabling Modbus TCP if not required or using alternative communication protocols with stronger security. 5) Conduct regular security assessments of industrial control systems and enforce strict access controls and logging for devices managing critical infrastructure. 6) Educate operational technology (OT) staff about the risks of unauthenticated Modbus commands and ensure incident response plans include scenarios involving denial of service on power monitoring devices.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands
CVE-2025-54851: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70
Description
A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state.
AI-Powered Analysis
Technical Analysis
CVE-2025-54851 identifies a denial of service vulnerability in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9. The vulnerability stems from missing authentication controls on critical Modbus TCP and Modbus RTU over TCP functions. An attacker can remotely send a specially crafted Modbus TCP packet to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the device's Modbus address to 15, which disrupts normal communication and causes the device to enter a denial-of-service state, rendering it unresponsive. The attack requires no authentication or user interaction, making it trivially exploitable over the network. The vulnerability impacts availability (A:H) but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. No patches or exploits in the wild are currently reported, but the lack of authentication on critical functions represents a significant security weakness. The device is typically used in industrial and energy management environments for power monitoring and control, making availability critical. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function).
Potential Impact
For European organizations, the primary impact of this vulnerability is on the availability of power monitoring and management systems that rely on the Socomec DIRIS Digiware M-70 device. Disruption of these devices can lead to loss of visibility into power consumption, potential mismanagement of energy resources, and operational downtime in industrial, commercial, or critical infrastructure environments. This could affect manufacturing plants, data centers, utilities, and other sectors dependent on continuous power monitoring. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly impact operational continuity and safety systems that rely on accurate power data. Given the device's role in energy management, prolonged outages could lead to financial losses and regulatory compliance issues. The ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments where Modbus traffic is accessible from less secure network segments or exposed to external networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by applying firewall rules or network segmentation to isolate these devices from untrusted networks. 2) Employ network-level authentication or VPN tunnels to secure Modbus communications, preventing unauthorized access to critical functions. 3) Monitor network traffic for anomalous Modbus Write Single Register requests, especially those targeting register 4352 or unusual Modbus address changes. 4) Coordinate with Socomec for firmware updates or patches addressing this vulnerability; if unavailable, consider compensating controls such as disabling Modbus TCP if not required or using alternative communication protocols with stronger security. 5) Conduct regular security assessments of industrial control systems and enforce strict access controls and logging for devices managing critical infrastructure. 6) Educate operational technology (OT) staff about the risks of unauthenticated Modbus commands and ensure incident response plans include scenarios involving denial of service on power monitoring devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-31T15:17:58.546Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692db927f910530b0eb07243
Added to database: 12/1/2025, 3:49:59 PM
Last enriched: 12/1/2025, 4:05:06 PM
Last updated: 12/5/2025, 2:07:49 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.