CVE-2024-48882
Published: 01 December 2025
Summary
CVE-2024-48882 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Socomec Diris M-70 Firmware. Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 19.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly protects the system from denial-of-service effects triggered by specially crafted unauthenticated Modbus TCP packets.
Validates incoming network packet content to reject malformed Modbus TCP packets that cause the device to crash.
Enforces boundary controls to monitor, filter, or rate-limit traffic to the exposed Modbus TCP service, preventing crafted packets from reaching the vulnerable component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote unauthenticated denial of service via a specially crafted Modbus TCP packet, directly facilitating Endpoint Denial of Service through application or system exploitation.
NVD Description
A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.
Deeper analysisAI
CVE-2024-48882 is a denial-of-service vulnerability in the Modbus TCP functionality of the Socomec DIRIS Digiware M-70 device running version 1.6.9. The issue arises when a specially crafted network packet is processed, leading to a denial of service. Exploitation requires no authentication, as an attacker can trigger the vulnerability by sending a malicious packet directly to the affected component.
A remote attacker with network access to the device can exploit this vulnerability without privileges or user interaction. Successful exploitation results in a denial of service, disrupting availability with a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). The changed scope (S:C) indicates potential impact beyond the vulnerable component, classified under CWE-306 (Missing Authentication for Critical Function).
Mitigation details are available in the Cisco Talos Intelligence report (TALOS-2024-2119) and the official Socomec advisory document, which address patches and remediation steps for the DIRIS Digiware M-70.
Details
- CWE(s)