A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change.
After this configuration change, the device will be in a denial-of-service state.

Subscriptions

Vendors Products
Socomec Subscribe
Diris M-70 Subscribe
Diris M-70 Firmware Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 05 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Socomec diris M-70 Firmware
CPEs cpe:2.3:h:socomec:diris_m-70:-:*:*:*:*:*:*:*
cpe:2.3:o:socomec:diris_m-70_firmware:1.6.9:*:*:*:*:*:*:*
Vendors & Products Socomec diris M-70 Firmware

Mon, 01 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Socomec
Socomec diris M-70
Vendors & Products Socomec
Socomec diris M-70

Mon, 01 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-12-01T20:16:58.316Z

Reserved: 2025-07-31T15:17:58.545Z

Link: CVE-2025-54850

cve-icon Vulnrichment

Updated: 2025-12-01T20:16:54.129Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-01T16:15:54.080

Modified: 2025-12-05T20:20:10.270

Link: CVE-2025-54850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T21:27:36Z

Weaknesses