Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55221: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-55221cvecve-2025-55221cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:06 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:07:38 UTC

Technical Analysis

CVE-2025-55221 identifies a denial of service (DoS) vulnerability in Socomec DIRIS Digiware M-70 version 1.6.9, specifically affecting the Modbus TCP and Modbus RTU over TCP USB Function implementations. The root cause is the absence of authentication controls on critical functions accessible via Modbus TCP on port 502. An attacker can exploit this by sending a specially crafted, unauthenticated network packet to the device, triggering a denial of service condition that disrupts device operation. The vulnerability is classified under CWE-306, indicating missing authentication for a critical function. The CVSS v3.1 score of 8.6 (high severity) reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with a high impact on availability (A:H) but no impact on confidentiality or integrity. This means the attacker can remotely cause the device to become unavailable without needing credentials or user action. The Socomec DIRIS Digiware M-70 is used for power monitoring and management in industrial and critical infrastructure environments, making availability crucial. No patches or exploits are currently reported, but the vulnerability's nature suggests it could be weaponized to disrupt power monitoring systems, potentially affecting operational continuity and safety.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of power monitoring and management systems that rely on the Socomec DIRIS Digiware M-70. Disruption of these devices could lead to loss of real-time power data, impairing operational decision-making and potentially causing cascading failures in industrial processes or critical infrastructure such as energy grids, manufacturing plants, and data centers. The lack of authentication means attackers can exploit the vulnerability remotely without credentials, increasing the attack surface. This could facilitate denial of service attacks from external threat actors or insiders with network access. The impact is particularly severe for sectors where continuous power monitoring is essential for safety and regulatory compliance. Additionally, the scope change in the CVSS score indicates that the vulnerability could affect other components or systems relying on the device's availability, amplifying the operational impact. European organizations with interconnected industrial control systems (ICS) and operational technology (OT) environments must consider this vulnerability a high priority to avoid service interruptions and potential safety hazards.

Mitigation Recommendations

1. Network Segmentation: Isolate the Socomec DIRIS Digiware M-70 devices within dedicated network segments that restrict access to trusted management systems only. 2. Firewall Rules: Implement strict firewall policies to block or filter Modbus TCP traffic (port 502) from untrusted or external networks, allowing only authorized IP addresses to communicate with the devices. 3. Intrusion Detection/Prevention: Deploy network monitoring tools capable of detecting anomalous Modbus TCP packets and potential exploitation attempts targeting port 502. 4. Vendor Coordination: Engage with Socomec for official patches or firmware updates addressing CVE-2025-55221 and apply them promptly once available. 5. Access Controls: Enforce strong access control policies on management interfaces and restrict physical and network access to the devices. 6. Incident Response Planning: Prepare response procedures for potential denial of service incidents affecting power monitoring systems to minimize downtime. 7. Regular Audits: Conduct periodic security assessments of OT networks to identify unauthorized access or suspicious activity related to Modbus communications. These measures go beyond generic advice by focusing on network-level controls and operational readiness specific to the affected product and protocol.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-11T15:04:59.033Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db927f910530b0eb07246

Added to database: 12/1/2025, 3:49:59 PM

Last enriched: 12/8/2025, 5:07:38 PM

Last updated: 1/19/2026, 7:31:54 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats