CVE-2024-53684
Published: 01 December 2025
Summary
CVE-2024-53684 is a high-severity CSRF (CWE-352) vulnerability in Socomec Diris M-70 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation of the specific CSRF flaw in WEBVIEW-M via vendor patches directly prevents exploitation of CVE-2024-53684.
Mechanisms like anti-CSRF tokens protect the authenticity of web sessions against forged cross-site requests exploiting this vulnerability.
Validating inputs such as CSRF tokens and request origins in WEBVIEW-M prevents unauthorized access from malicious webpages.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF vulnerability in public-facing WEBVIEW-M web functionality directly enables exploitation of a public-facing application for unauthorized access.
NVD Description
A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability.
Deeper analysisAI
A cross-site request forgery (CSRF) vulnerability, tracked as CVE-2024-53684 and associated with CWE-352, affects the WEBVIEW-M functionality in Socomec DIRIS Digiware M-70 version 1.6.9. The flaw allows a specially crafted HTTP request to lead to unauthorized access when processed by the vulnerable component.
The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating network accessibility with high attack complexity, no required privileges, and user interaction. An attacker can exploit it by staging a malicious webpage that tricks an authenticated user into triggering the CSRF request, potentially resulting in high-impact unauthorized access affecting confidentiality, integrity, and availability.
Mitigation details are available in the Talos Intelligence advisory (TALOS-2024-2116) and the vendor's security bulletin from Socomec, which cover patches and remediation steps for DIRIS Digiware M-70 and related models. Security practitioners should consult these references for specific update instructions.
Details
- CWE(s)