CVE-2025-55221
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-05
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| socomec | diris_m-70_firmware | 1.6.9 |
| socomec | diris_m-70 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a denial of service issue in the Modbus TCP and Modbus RTU over TCP USB Function of Socomec DIRIS Digiware M-70 version 1.6.9. An attacker can send a specially crafted, unauthenticated network packet via Modbus TCP on port 502 to trigger the vulnerability, causing the device to become unavailable or unresponsive.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service (DoS), meaning an attacker can disrupt the normal operation of the affected device by making it unavailable or unresponsive. This could lead to interruptions in monitoring or control functions that rely on the Socomec DIRIS Digiware M-70 device.