Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 05 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec diris M-70 Firmware
|
|
| CPEs | cpe:2.3:h:socomec:diris_m-70:-:*:*:*:*:*:*:* cpe:2.3:o:socomec:diris_m-70_firmware:1.6.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Socomec diris M-70 Firmware
|
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Socomec
Socomec diris M-70 |
|
| Vendors & Products |
Socomec
Socomec diris M-70 |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state. | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-12-01T20:17:51.595Z
Reserved: 2025-07-31T15:17:58.546Z
Link: CVE-2025-54851
Updated: 2025-12-01T20:17:44.099Z
Status : Analyzed
Published: 2025-12-01T16:15:54.260
Modified: 2025-12-05T20:47:17.533
Link: CVE-2025-54851
No data.
OpenCVE Enrichment
Updated: 2025-12-02T11:59:02Z