CVE-2025-54849

7.5 HIGH

📋 TL;DR

An unauthenticated denial-of-service vulnerability in Socomec DIRIS Digiware M-70 allows attackers to crash the device by sending a specially crafted Modbus TCP packet. This affects industrial control systems using version 1.6.9 of the device, potentially disrupting power monitoring and management operations.

💻 Affected Systems

Products:
  • Socomec DIRIS Digiware M-70
Versions: 1.6.9
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Modbus TCP and Modbus RTU over TCP functionality. Device uses default Modbus port 502.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device outage requiring physical reset, disrupting power monitoring and control functions in critical infrastructure environments.

🟠

Likely Case

Device becomes unresponsive to Modbus communications, requiring manual reboot to restore functionality.

🟢

If Mitigated

Minimal impact if network segmentation and access controls prevent unauthorized access to Modbus port 502.

🌐 Internet-Facing: HIGH - Directly exposed devices can be easily exploited with a single packet from anywhere on the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems can still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending a single Modbus TCP packet with function code 6 to register 4352 with value 1. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available at time of analysis

Restart Required: No

Instructions:

Check Socomec website for security advisories and firmware updates. Contact vendor support for patch availability.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Modbus devices from untrusted networks using firewalls or VLANs

Port Restriction

linux

Block external access to TCP port 502 using firewall rules

iptables -A INPUT -p tcp --dport 502 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit Modbus traffic to authorized sources only
  • Deploy intrusion detection systems to monitor for Modbus function code 6 writes to register 4352

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is 1.6.9, device is vulnerable.

Check Version:

Check via device web interface or use Modbus function code to read device information registers

Verify Fix Applied:

Verify firmware version has been updated beyond 1.6.9. Test Modbus functionality remains operational after attempted exploitation.

📡 Detection & Monitoring

Log Indicators:

  • Device becoming unresponsive
  • Modbus communication failures
  • Unexpected device reboots

Network Indicators:

  • Modbus TCP packets with function code 6 to register 4352 with value 1
  • Multiple connection attempts to port 502 from unauthorized sources

SIEM Query:

source_port=502 AND (modbus.function_code=6 AND modbus.register_address=4352 AND modbus.register_value=1)

🔗 References

📤 Share & Export