CVE-2025-54848

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to cause denial of service on Socomec DIRIS Digiware M-70 devices by sending a specific sequence of Modbus TCP messages. The attack exploits the device's configuration change mechanism to put it into a non-responsive state. Industrial control system operators using these devices are affected.

💻 Affected Systems

Products:
  • Socomec DIRIS Digiware M-70
Versions: 1.6.9
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Modbus TCP and Modbus RTU over TCP functionality. Port 502 is typically open by default for Modbus communication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial processes relying on the device become unavailable, potentially causing production shutdowns, safety system failures, or operational disruptions.

🟠

Likely Case

Device becomes unresponsive, requiring physical reset or maintenance intervention to restore functionality, causing temporary operational disruption.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with minimal operational effect.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending specific Modbus messages in sequence but does not require authentication. Attack can be automated with basic Modbus tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Socomec website for security advisories and firmware updates. Contact vendor support for patching guidance.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Modbus devices in separate network segments with strict firewall rules

Access Control Lists

all

Restrict access to port 502/TCP to authorized IP addresses only

🧯 If You Can't Patch

  • Implement network monitoring for suspicious Modbus traffic patterns
  • Deploy intrusion detection systems with Modbus protocol anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. Version 1.6.9 is confirmed vulnerable.

Check Version:

Check via device web interface at http://[device-ip]/ or via serial console connection

Verify Fix Applied:

Verify firmware version has been updated beyond 1.6.9. Test Modbus functionality remains operational after attempted exploit sequence.

📡 Detection & Monitoring

Log Indicators:

  • Multiple Write Single Register (function code 6) requests to registers 58112, 29440, 57856 in sequence
  • Device becoming unresponsive in logs

Network Indicators:

  • Modbus TCP packets to port 502 with specific register/value combinations: 58112=1000, 29440=*, 57856=161
  • Unusual Modbus configuration change patterns

SIEM Query:

source_port:502 AND (modbus.function_code:6 AND modbus.register_address:58112 AND modbus.value:1000) OR (modbus.register_address:29440) OR (modbus.register_address:57856 AND modbus.value:161)

🔗 References

📤 Share & Export