Cyber Posture

CVE-2025-55221

High

Published: 01 December 2025

Published
01 December 2025
Modified
05 December 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0007 20.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-55221 is a denial of service vulnerability affecting the Modbus TCP and Modbus RTU over TCP USB Function functionality in Socomec DIRIS Digiware M-70 version 1.6.9. The issue arises from a specially crafted network packet that triggers a denial of service condition. This vulnerability is specific to malicious messages sent via Modbus TCP over port 502 and is associated with CWE-306 (Missing Authentication for Critical Function). It received a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).

Any attacker with network access to the affected device can exploit this vulnerability by sending an unauthenticated packet over port 502, leading to a denial of service that impacts availability without requiring privileges, user interaction, or authentication.

Mitigation details are available in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2251.

Details

CWE(s)
CWE-306

Affected Products

socomec
diris m-70 firmware
1.6.9

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability allows unauthenticated remote attackers to send a specially crafted packet over port 502, exploiting the Modbus TCP service to trigger a denial of service, directly mapping to application exploitation for endpoint DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References