Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54851: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-54851cvecve-2025-54851cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:13 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:05:06 UTC

Technical Analysis

CVE-2025-54851 identifies a denial of service vulnerability in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9. The vulnerability stems from missing authentication controls on critical Modbus TCP and Modbus RTU over TCP functions. An attacker can remotely send a specially crafted Modbus TCP packet to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the device's Modbus address to 15, which disrupts normal communication and causes the device to enter a denial-of-service state, rendering it unresponsive. The attack requires no authentication or user interaction, making it trivially exploitable over the network. The vulnerability impacts availability (A:H) but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. No patches or exploits in the wild are currently reported, but the lack of authentication on critical functions represents a significant security weakness. The device is typically used in industrial and energy management environments for power monitoring and control, making availability critical. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function).

Potential Impact

For European organizations, the primary impact of this vulnerability is on the availability of power monitoring and management systems that rely on the Socomec DIRIS Digiware M-70 device. Disruption of these devices can lead to loss of visibility into power consumption, potential mismanagement of energy resources, and operational downtime in industrial, commercial, or critical infrastructure environments. This could affect manufacturing plants, data centers, utilities, and other sectors dependent on continuous power monitoring. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly impact operational continuity and safety systems that rely on accurate power data. Given the device's role in energy management, prolonged outages could lead to financial losses and regulatory compliance issues. The ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments where Modbus traffic is accessible from less secure network segments or exposed to external networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict network access to the Modbus TCP port 503 on DIRIS Digiware M-70 devices by applying firewall rules or network segmentation to isolate these devices from untrusted networks. 2) Employ network-level authentication or VPN tunnels to secure Modbus communications, preventing unauthorized access to critical functions. 3) Monitor network traffic for anomalous Modbus Write Single Register requests, especially those targeting register 4352 or unusual Modbus address changes. 4) Coordinate with Socomec for firmware updates or patches addressing this vulnerability; if unavailable, consider compensating controls such as disabling Modbus TCP if not required or using alternative communication protocols with stronger security. 5) Conduct regular security assessments of industrial control systems and enforce strict access controls and logging for devices managing critical infrastructure. 6) Educate operational technology (OT) staff about the risks of unauthenticated Modbus commands and ensure incident response plans include scenarios involving denial of service on power monitoring devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-07-31T15:17:58.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db927f910530b0eb07243

Added to database: 12/1/2025, 3:49:59 PM

Last enriched: 12/1/2025, 4:05:06 PM

Last updated: 12/5/2025, 2:07:49 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats