After this configuration change, the device will be in a denial-of-service state.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec diris M-70 Firmware
|
|
| CPEs | cpe:2.3:h:socomec:diris_m-70:-:*:*:*:*:*:*:* cpe:2.3:o:socomec:diris_m-70_firmware:1.6.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Socomec diris M-70 Firmware
|
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec
Socomec diris M-70 |
|
| Vendors & Products |
Socomec
Socomec diris M-70 |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state. | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-12-01T20:16:58.316Z
Reserved: 2025-07-31T15:17:58.545Z
Link: CVE-2025-54850
Updated: 2025-12-01T20:16:54.129Z
Status : Analyzed
Published: 2025-12-01T16:15:54.080
Modified: 2025-12-05T20:20:10.270
Link: CVE-2025-54850
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:36Z