CVE-2024-48882
📋 TL;DR
An unauthenticated denial-of-service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 devices. Attackers can send specially crafted network packets to crash the device, disrupting power monitoring and control operations. This affects organizations using vulnerable versions of these industrial power monitoring systems.
💻 Affected Systems
- Socomec DIRIS Digiware M-70
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical reboot, disrupting power monitoring and potentially affecting downstream industrial processes that rely on this data.
Likely Case
Service disruption of the DIRIS Digiware M-70 device, causing loss of power monitoring capabilities until manual intervention.
If Mitigated
Limited impact if devices are behind firewalls with strict network segmentation and Modbus traffic filtering.
🎯 Exploit Status
Talos Intelligence has published technical details and proof-of-concept information. The vulnerability requires sending a specially crafted Modbus TCP packet to port 502.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Socomec for updated firmware
Vendor Advisory: https://www.socomec.fr/sites/default/files/2025-04/CVE-2024-48882---Diris-Digiware-Webview-_VULNERABILITIES_2025-04-11-17-17-43_English_0.pdf
Restart Required: Yes
Instructions:
1. Contact Socomec support for updated firmware. 2. Backup device configuration. 3. Apply firmware update following Socomec's instructions. 4. Reboot device. 5. Verify functionality.
🔧 Temporary Workarounds
Network Segmentation and Firewall Rules
allRestrict access to Modbus TCP port 502 to only trusted management systems
Disable Modbus TCP if Not Required
allTurn off Modbus TCP functionality if alternative communication methods are available
🧯 If You Can't Patch
- Implement strict network segmentation - isolate DIRIS devices in separate VLAN with firewall rules blocking unauthorized Modbus traffic
- Deploy intrusion detection systems monitoring for anomalous Modbus packets and implement rate limiting on port 502
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or serial console. If running version 1.6.9 with Modbus TCP enabled, device is vulnerable.
Check Version:
Check via web interface at http://[device-ip]/ or via serial console connection
Verify Fix Applied:
Verify firmware version has been updated beyond 1.6.9 and test Modbus TCP functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- Device crash/reboot logs
- Modbus TCP connection attempts from unexpected sources
- Multiple malformed Modbus packet receptions
Network Indicators:
- Unusual volume of Modbus TCP traffic to port 502
- Malformed Modbus packets (incorrect length, invalid function codes)
- Traffic from non-authorized IP addresses to port 502
SIEM Query:
source_port:502 AND (packet_size:<10 OR packet_size:>260) OR (source_ip NOT IN [authorized_ips] AND dest_port:502)