CVE-2025-55222

8.6 HIGH

📋 TL;DR

An unauthenticated denial-of-service vulnerability exists in Socomec DIRIS Digiware M-70 devices running version 1.6.9. Attackers can send specially crafted Modbus RTU over TCP packets to port 503 to crash the device, disrupting power monitoring functionality. This affects industrial control systems using these specific power monitoring devices.

💻 Affected Systems

Products:
  • Socomec DIRIS Digiware M-70
Versions: 1.6.9
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Modbus TCP and Modbus RTU over TCP USB Function enabled, but this is typically enabled by default for industrial communication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical restart, disrupting power monitoring and potentially affecting downstream industrial processes that rely on this data.

🟠

Likely Case

Temporary service disruption of the power monitoring system until manual intervention restarts the device.

🟢

If Mitigated

Minimal impact if network segmentation prevents external access to port 503 and proper monitoring detects anomalous traffic.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and exploitable via network packets, making internet-exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to disrupt power monitoring operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted packets to port 503, which is straightforward for attackers with network access. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check with Socomec for security updates. As of this analysis, no official patch has been released according to the referenced Talos Intelligence report.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to port 503/TCP to only trusted Modbus clients using firewall rules.

Disable Unused Modbus Interfaces

all

If Modbus RTU over TCP USB Function is not required, disable it in device configuration.

🧯 If You Can't Patch

  • Implement strict network access controls to isolate DIRIS Digiware M-70 devices from untrusted networks.
  • Monitor port 503/TCP traffic for anomalous patterns and implement rate limiting where possible.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is 1.6.9 and Modbus interfaces are enabled, the device is vulnerable.

Check Version:

Check via device web interface at System > Information or via serial console using manufacturer-specific commands.

Verify Fix Applied:

Verify firmware has been updated to a version beyond 1.6.9 or that workarounds have been properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Device restart logs without normal shutdown
  • Modbus protocol errors or malformed packet alerts

Network Indicators:

  • Unusual traffic spikes to port 503/TCP
  • Malformed Modbus RTU over TCP packets

SIEM Query:

source_port:503 AND (packet_size:<normal_range OR protocol_violation:true)

🔗 References

📤 Share & Export