Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 08 Dec 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec diris Digiware M-70
Socomec diris Digiware M-70 Firmware |
|
| CPEs | cpe:2.3:h:socomec:diris_digiware_m-70:-:*:*:*:*:*:*:* cpe:2.3:o:socomec:diris_digiware_m-70_firmware:1.6.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Socomec diris Digiware M-70
Socomec diris Digiware M-70 Firmware |
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec
Socomec diris M-70 |
|
| Vendors & Products |
Socomec
Socomec diris M-70 |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus TCP messages to port 502 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state. | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-12-01T20:15:40.027Z
Reserved: 2025-07-31T15:17:58.545Z
Link: CVE-2025-54848
Updated: 2025-12-01T20:15:35.269Z
Status : Analyzed
Published: 2025-12-01T16:15:53.723
Modified: 2025-12-08T19:29:05.783
Link: CVE-2025-54848
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:22Z