Cyber Posture

CVE-2024-53684

High

Published: 01 December 2025

Published
01 December 2025
Modified
05 December 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53684 is a high-severity CSRF (CWE-352) vulnerability in Socomec Diris M-70 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely remediation of the specific CSRF flaw in WEBVIEW-M via vendor patches directly prevents exploitation of CVE-2024-53684.

prevent

Mechanisms like anti-CSRF tokens protect the authenticity of web sessions against forged cross-site requests exploiting this vulnerability.

prevent

Validating inputs such as CSRF tokens and request origins in WEBVIEW-M prevents unauthorized access from malicious webpages.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CSRF vulnerability in public-facing WEBVIEW-M web functionality directly enables exploitation of a public-facing application for unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability.

Deeper analysisAI

A cross-site request forgery (CSRF) vulnerability, tracked as CVE-2024-53684 and associated with CWE-352, affects the WEBVIEW-M functionality in Socomec DIRIS Digiware M-70 version 1.6.9. The flaw allows a specially crafted HTTP request to lead to unauthorized access when processed by the vulnerable component.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating network accessibility with high attack complexity, no required privileges, and user interaction. An attacker can exploit it by staging a malicious webpage that tricks an authenticated user into triggering the CSRF request, potentially resulting in high-impact unauthorized access affecting confidentiality, integrity, and availability.

Mitigation details are available in the Talos Intelligence advisory (TALOS-2024-2116) and the vendor's security bulletin from Socomec, which cover patches and remediation steps for DIRIS Digiware M-70 and related models. Security practitioners should consult these references for specific update instructions.

Details

CWE(s)

Affected Products

socomec
diris m-70 firmware
1.6.9

CVEs Like This One

CVE-2025-55222Same product: Socomec Diris M-70
CVE-2024-48882Same product: Socomec Diris M-70
CVE-2025-55221Same product: Socomec Diris M-70
CVE-2025-23417Same product: Socomec Diris M-70
CVE-2025-26858Same product: Socomec Diris M-70
CVE-2025-2319Shared CWE-352
CVE-2025-23803Shared CWE-352
CVE-2025-25071Shared CWE-352
CVE-2025-23821Shared CWE-352
CVE-2025-30615Shared CWE-352

References