Cyber Posture

CVE-2024-53684

High

Published: 01 December 2025

Published
01 December 2025
Modified
05 December 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

A cross-site request forgery (CSRF) vulnerability, tracked as CVE-2024-53684 and associated with CWE-352, affects the WEBVIEW-M functionality in Socomec DIRIS Digiware M-70 version 1.6.9. The flaw allows a specially crafted HTTP request to lead to unauthorized access when processed by the vulnerable component.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating network accessibility with high attack complexity, no required privileges, and user interaction. An attacker can exploit it by staging a malicious webpage that tricks an authenticated user into triggering the CSRF request, potentially resulting in high-impact unauthorized access affecting confidentiality, integrity, and availability.

Mitigation details are available in the Talos Intelligence advisory (TALOS-2024-2116) and the vendor's security bulletin from Socomec, which cover patches and remediation steps for DIRIS Digiware M-70 and related models. Security practitioners should consult these references for specific update instructions.

Details

CWE(s)
CWE-352

Affected Products

socomec
diris m-70 firmware
1.6.9

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CSRF vulnerability in public-facing WEBVIEW-M web functionality directly enables exploitation of a public-facing application for unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References