Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 08 Dec 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec diris Digiware M-70
Socomec diris Digiware M-70 Firmware |
|
| CPEs | cpe:2.3:h:socomec:diris_digiware_m-70:-:*:*:*:*:*:*:* cpe:2.3:o:socomec:diris_digiware_m-70_firmware:1.6.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Socomec diris Digiware M-70
Socomec diris Digiware M-70 Firmware |
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec
Socomec diris M-70 |
|
| Vendors & Products |
Socomec
Socomec diris M-70 |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 502 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-12-01T20:16:27.906Z
Reserved: 2025-07-31T15:17:58.545Z
Link: CVE-2025-54849
Updated: 2025-12-01T20:16:23.762Z
Status : Analyzed
Published: 2025-12-01T16:15:53.900
Modified: 2025-12-08T19:23:54.010
Link: CVE-2025-54849
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:27Z