Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55221: CWE-306: Missing Authentication for Critical Function in Socomec DIRIS Digiware M-70

0
High
VulnerabilityCVE-2025-55221cvecve-2025-55221cwe-306
Published: Mon Dec 01 2025 (12/01/2025, 15:25:06 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: DIRIS Digiware M-70

Description

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:04:53 UTC

Technical Analysis

CVE-2025-55221 identifies a critical vulnerability in the Socomec DIRIS Digiware M-70 device, specifically version 1.6.9. The vulnerability arises from missing authentication controls on critical Modbus TCP and Modbus RTU over TCP USB Function interfaces. Modbus is a widely used industrial protocol, and the device listens on the standard Modbus TCP port 502. An attacker can send a specially crafted Modbus packet without any authentication or prior access to trigger a denial of service condition, causing the device to become unresponsive or crash. This vulnerability is classified under CWE-306, indicating missing authentication for a critical function. The CVSS v3.1 score of 8.6 reflects a high severity due to network attack vector, low attack complexity, no privileges or user interaction required, and a scope change indicating potential impact beyond the vulnerable component. The vulnerability affects availability but not confidentiality or integrity. Although no public exploits are reported, the simplicity of exploitation and critical nature of the device in energy monitoring and industrial environments make this a significant threat. The lack of authentication on Modbus TCP interfaces is a common security weakness in industrial control systems, often exploited to disrupt operations. The device’s role in monitoring electrical parameters means denial of service could impair operational visibility and control, leading to potential safety and operational risks. No patches or firmware updates are currently available, increasing the urgency for interim mitigations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially in sectors relying on industrial automation, energy management, and critical infrastructure monitoring where Socomec DIRIS Digiware M-70 devices are deployed. A denial of service attack could disrupt real-time monitoring of electrical parameters, leading to delayed detection of faults or abnormal conditions. This can cause operational downtime, increased risk of equipment damage, and safety hazards. In energy distribution and manufacturing environments, loss of monitoring capability can affect compliance with regulatory requirements and operational efficiency. The lack of authentication means attackers can exploit this vulnerability remotely without credentials, increasing the attack surface. Given the interconnected nature of industrial networks in Europe, a successful attack could propagate operational disruptions across multiple sites. Although confidentiality and integrity are not directly impacted, availability loss in critical systems can have cascading effects on business continuity and safety. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates urgent attention is needed to prevent potential exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately restrict network access to the Modbus TCP port 502 on DIRIS Digiware M-70 devices by applying firewall rules or access control lists to allow only trusted management systems. 2) Segment industrial control networks to isolate vulnerable devices from general enterprise networks and the internet, minimizing exposure. 3) Deploy network intrusion detection or anomaly detection systems tuned to identify unusual Modbus traffic patterns indicative of exploitation attempts. 4) Disable unused Modbus TCP or RTU over TCP USB interfaces if not required for operations. 5) Monitor device logs and network traffic for signs of denial of service or malformed packets targeting Modbus services. 6) Engage with Socomec for firmware updates or patches addressing this vulnerability and plan for timely deployment once available. 7) Conduct regular security assessments of industrial control systems to identify and remediate similar missing authentication issues. 8) Train operational technology personnel on the risks of unauthenticated protocols and the importance of network segmentation and access controls. These targeted actions go beyond generic advice by focusing on network-level controls and operational monitoring specific to Modbus protocol vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-11T15:04:59.033Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db927f910530b0eb07246

Added to database: 12/1/2025, 3:49:59 PM

Last enriched: 12/1/2025, 4:04:53 PM

Last updated: 12/5/2025, 2:01:48 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats