Shelly’s Pro 3EM smart DIN-rail energy meter contains a Modbus parsing bug that CISA calls an out‑of‑bounds read leading to a reboot and denial‑of‑service; the agency assigned CVE‑2025‑12056 and reported a CVSS v4 base score of 8.3, warning operators that specially crafted Modbus requests can force the device to access illegal data addresses without normal error handling and cause a reboot.
Shelly’s Pro 3EM is a three‑phase DIN‑rail energy meter that supports Wi‑Fi, Ethernet and Modbus TCP for integration with building and industrial systems; its product documentation shows Modbus is an intended feature for telemetry and integration. CISA’s advisory (published as an ICS advisory) summarizes the issue succinctly: an attacker who can reach the device’s Modbus service and send a specially crafted request can cause an out‑of‑bounds read which the firmware does not recover from cleanly — the device reboots and becomes unavailable. The advisory flags the vulnerability as leading primarily to availability impact (DoS) and reports no confirmed public exploitation at the time of publication. The advisory also notes Shelly did not respond to coordination attempts and urges users to contact the vendor and implement mitigations.
Why this matters: Modbus is widely used in OT/industrial environments and many building automation or energy-management integrations expect meters to be reachable from supervisory systems. A meter that will reboot when fed illegal register addresses represents an easy and reliable way to disrupt monitoring and any dependent automation — particularly where the meter is also used as a control signal for charging, load shedding or safety logic.
In practical terms:
Immediate (hours)
At time of writing, the advisory text and CISA notice provide the authoritative detail for CVE‑2025‑12056; searches for a populated MITRE/NVD entry for that CVE may return no or delayed enrichment — continue to check the canonical trackers for vendor remediation and the final CVE/NVD metadata.
Action steps (summary)
The vulnerability is fixable from a vendor‑patch perspective, but until Shelly publishes and operators apply a fix, defense‑in‑depth and network controls are the only reliable ways to avoid service disruption. For organizations that cannot isolate affected meters quickly, consider planned maintenance windows to replace or remove exposed units — the operational risk of an uncontrolled reboot chain can be greater than the cost of temporary manual operation.
Shelly’s product documentation confirms Modbus is a core integration mechanism for the Pro 3EM, which explains why this specific parsing flaw is impactful; earlier Shelly product CVEs and community Modbus observations establish precedent for both the attack surface and the kinds of firmware parsing errors that lead to denial‑of‑service. Operators must assume exposure until proven otherwise, apply the containment measures laid out above, and track vendor and national vulnerability feeds for a definitive patch and remediation timeline.
Source: CISA Shelly Pro 3EM | CISA
Background
Shelly’s Pro 3EM is a three‑phase DIN‑rail energy meter that supports Wi‑Fi, Ethernet and Modbus TCP for integration with building and industrial systems; its product documentation shows Modbus is an intended feature for telemetry and integration. CISA’s advisory (published as an ICS advisory) summarizes the issue succinctly: an attacker who can reach the device’s Modbus service and send a specially crafted request can cause an out‑of‑bounds read which the firmware does not recover from cleanly — the device reboots and becomes unavailable. The advisory flags the vulnerability as leading primarily to availability impact (DoS) and reports no confirmed public exploitation at the time of publication. The advisory also notes Shelly did not respond to coordination attempts and urges users to contact the vendor and implement mitigations.Why this matters: Modbus is widely used in OT/industrial environments and many building automation or energy-management integrations expect meters to be reachable from supervisory systems. A meter that will reboot when fed illegal register addresses represents an easy and reliable way to disrupt monitoring and any dependent automation — particularly where the meter is also used as a control signal for charging, load shedding or safety logic.
What the advisory specifically claims
- Affected product: Shelly Pro 3EM — all versions (the advisory lists every Pro 3EM firmware as in‑scope).
- Vulnerability class: Out‑of‑Bounds Read (CWE‑125) triggered by a crafted Modbus TCP request.
- Primary impact: Denial‑of‑Service (device reboots). The advisory reports a CVSS v3 base score of 7.4 and a CVSS v4 base score of 8.3 (vector strings included in the advisory).
- Exploitability: The advisory describes low attack complexity; the attacker must be able to reach the Modbus service (adjacent network or via misconfiguration that exposes the device) — CISA notes the vulnerability is not exploitable remotely in the sense of Internet‑wide exploitation if proper network controls are in place, but network reachability of the Modbus port enables exploit attempts.
Technical analysis — what the advisory says and what that likely means
How the bug appears to work
The advisory says a specially crafted Modbus request causes the meter to attempt to access an illegal data address and that the code path lacks standard error handling, causing a reboot. That description aligns with a classic out‑of‑bounds read scenario in which a Modbus register index (or count) supplied by a requester exceeds the bounds used by the device’s register table or memory map.In practical terms:
- Modbus requests contain function codes and register addresses/counts. If the firmware accepts registers without bounds‑checking and then dereferences memory at a computed offset, an attacker can supply values that index into invalid memory.
- An out‑of‑bounds read can trigger undefined behavior (exceptions, memory corruption-handling faults, or kernel panics depending on the runtime), which on embedded systems is commonly resolved by a device restart — exactly the behavior CISA reports.
Preconditions and attack vector
- Network reachability to the meter’s Modbus TCP listener (default port 502) or other enabled Modbus endpoints.
- Ability to send raw Modbus requests (standard Modbus clients/tools suffice).
- No authentication or network access control that prevents hostile Modbus requests from reaching the device.
Evidence and context: Shelly’s Modbus support and community observations
Shelly’s product page confirms Modbus support for the Pro 3EM; the device exposes Modbus registers for instantaneous power, energy, voltage, current and other channels — making Modbus one of the principal integration vectors for this product. That exact feature is why a Modbus parsing issue is material. Public user forums and Shelly’s own community have previously recorded Modbus exception errors and register mapping mismatches (for benign misconfiguration cases). Those threads demonstrate both the wide use of Modbus on the Pro 3EM and how common it is for users and integrators to query registers directly — raising the odds that a misconfigured or exposed meter could be discovered and probed.Verification and cross‑checks (what could be independently verified)
- Shelly product documentation confirms the device implements Modbus TCP (product page). This validates the attack surface described in the advisory.
- Public trackers and vulnerability history show Shelly has had memory/validation issues in earlier Pro product lines (for example, CVE reports and research about earlier Pro‑line out‑of‑bounds issues), establishing precedent for this category of vulnerability against Shelly embedded firmware. That historical context raises confidence the described bug class is plausible.
Risk evaluation — who should care, and how urgently
- Operators who use the Pro 3EM as a local telemetry meter feeding energy dashboards, EV charger controllers, or automation rules should treat this as high priority for containment. The meter’s unavailability (reboot loops or DoS) can disable automated load‑shaving, EV charge control, or protective automation that relies on continuous power/energy telemetry.
- Industrial and commercial installers who expose meters to supervisory networks or allow vendor portals to reach meters remotely have an elevated risk profile.
- Residential customers that expose the device to the Internet (e.g., through remote management, cloud bridging or misconfigured NAT rules) are at risk if the device’s Modbus port is reachable.
- Impact: Availability (DoS) — high for systems relying on continuous telemetry.
- Exploit complexity: Low — Modbus clients/tools suffice if the port is reachable.
- Exploit requirements: Network reachability; not necessarily authenticated access if Modbus is enabled without further controls.
Practical mitigation and hardening checklist (operational playbook)
Use this checklist to rapidly reduce exposure and buy time while waiting for vendor fixes or further guidance.Immediate (hours)
- Block Modbus TCP (port 502) at the perimeter for any segments that include Pro 3EM devices unless explicit, vetted host‑to‑host access is required.
- If devices are Internet‑reachable, remove public exposure immediately (terminate NAT rules, move devices behind a firewall).
- For devices in critical paths (EV chargers, grid‑tie automations), put temporary controls in place to avoid dependence on a single meter (e.g., fallback to manual control or alternate telemetry source).
- Inventory: Identify every Pro 3EM in your estate (model variants, IP addresses, firmware versions, CT types). This single step reduces uncertainty and enables targeted containment.
- Segment: Move Pro 3EM units into a dedicated OT meter VLAN with strict ingress/egress rules; allow only known supervisory hosts to query Modbus.
- Implement allow‑lists for Modbus clients: only authorized engineering hosts should be permitted to talk to the meter’s Modbus port.
- Enable logging/monitoring: ensure flows to/from the meter are logged and that Modbus protocol anomalies generate alerts in your IDS/SIEM.
- Vendor coordination: Contact Shelly support and request an official vendor advisory or firmware patch schedule. Track CVE/NVD updates and vendor bulletins.
- Firmware management: Plan a controlled firmware update process for meters once Shelly publishes a patch; stage and test upgrades on a small set before wide rollout.
- Detection: Deploy Modbus‑aware IDS/IPS rules to detect malformed Modbus requests (unexpected function codes, extreme register counts, or illegal addresses). Leverage OT intrusion detection tools where available.
- Operational fallback: Add redundancy where the meter is mission‑critical — a second telemetry path (MQTT, cloud reports, or a parallel meter) reduces single‑point availability risk.
- If supervisory servers (SCADA, HMI, building automation controllers) run on Windows and query meters directly, restrict which Windows hosts have Modbus client software installed and which can reach the meter VLAN. Treat engineering workstations with Modbus tools as high‑risk endpoints and apply endpoint controls (application whitelisting, STRONG AV, host firewall rules).
- Where remote access to OT management is needed, prefer jump hosts with MFA and strict access control rather than direct RDP/VPN access from unmanaged endpoints.
Detection and monitoring recommendations
- Watch for repeated Modbus exception responses and connection resets to the Pro 3EM IPs. Reboot chains and repeated connection attempts preceding a device restart should be treated as high‑severity alerts.
- Implement Modbus function‑level logging if the device or gateway supports it, and configure SIEM correlation rules for:
- Abnormally high counts of Modbus read requests.
- Requests with register addresses outside documented ranges.
- Unexpected Modbus function codes.
- Network flow (NetFlow/NetMon) rules: flag repeated short bursts of TCP sessions to port 502 destined for meters, especially from unknown or external addresses.
Vendor posture and disclosure status — what to watch for
CISA’s advisory states that Shelly did not respond to CISA’s coordination attempts; the agency therefore recommends defensive mitigations rather than relying on vendor fixes. That said, vendor engagement and firmware updates can appear after initial advisories. Operators should monitor: Shelly’s official product/security pages, the CISA ICS advisory feed, and MITRE/NVD for CVE record enrichment.At time of writing, the advisory text and CISA notice provide the authoritative detail for CVE‑2025‑12056; searches for a populated MITRE/NVD entry for that CVE may return no or delayed enrichment — continue to check the canonical trackers for vendor remediation and the final CVE/NVD metadata.
Why this looks like a textbook ICS attack surface issue (and what that implies)
- Modbus is a decades‑old protocol historically designed for trusted industrial networks. Devices that export Modbus without rigorous bounds checking or without network isolation remain high‑value, easy targets. Shelly’s Pro 3EM is an example of a device that straddles both consumer/prosumer markets and light industrial usage; when devices cross those boundaries, integration convenience can increase attack surface.
- CISA’s mitigation list reflects the usual ICS playbook: minimize network exposure, segment networks, and use more secure remote access methods (VPNs and jump hosts), while recognizing those are stopgaps not substitutes for proper vendor fixes.
What defenders should document and communicate internally
- Create a short incident‑response playbook specific to Pro 3EM: identification, isolation, temporary access controls, contact vendor, and firmware update plan.
- Add CVE‑2025‑12056 (per CISA advisory) to your vulnerability and patch backlog; mark devices that cannot be patched as candidates for hardware replacement or stricter isolation.
- Inform operational stakeholders (facilities, energy managers, EV charging operations) that loss of meter telemetry could cause automated systems to degrade or stop, and that manual contingency procedures should be prepared.
Strengths and limitations of the advisory — critical analysis
Strengths- The advisory gives clear, actionable mitigations: reduce exposure, segment, and monitor. Those are practical, effective in the short term, and do not rely on vendor patch availability.
- CISA supplied both CVSS v3 and v4 vectors and explicitly described the attack class and impact (DoS via reboot), enabling defenders to triage severity and map to enterprise risk models.
- The advisory states “Pro 3EM: all versions” are affected — blanket statements like this are cautious but create operational strain because organizations must treat every deployed unit as vulnerable until vendor patch notes identify fixed builds. That can drive wide, urgent changes to network architecture in short windows.
- Vendor non‑response to coordination is a real problem: it prevents defenders from getting a timeline for a patch and from receiving vendor‑specific detection or workaround guidance. In such cases, the only durable mitigation is network isolation or device replacement.
- At the time of publication, canonical CVE/NVD listings were not fully visible or enriched via the usual public trackers. This can complicate automated vulnerability management systems that rely on NVD feeds for assignment and scoring. Defenders should therefore treat the advisory itself as the authoritative record until trackers are updated.
Recommended communications to vendors, integrators and customers
- Contact Shelly support with the meter serials and request a firmware status update and any recommended temporary configuration changes (e.g., disable Modbus if feasible). Record all vendor tickets for compliance.
- Inform integrators and facilities teams that any automation depending on Pro 3EM telemetry must have a fallback manual control procedure activated until devices are patched or isolated.
- If third‑party monitoring or cloud services integrate with the meter, notify those providers to confirm they are not querying Modbus in ways that could unintentionally trigger crashes and to coordinate safe polling patterns.
Final assessment and practical next steps
This advisory is a reminder that even seemingly low‑risk peripheral devices like energy meters can become operational single points of failure. The combination of a widely used protocol (Modbus), low attack complexity, and devices used in automation paths makes the Shelly Pro 3EM bug a material operational security problem for any site that relies on these meters for automated control.Action steps (summary)
- Immediately verify that no Pro 3EM devices are reachable from untrusted networks; block Modbus/TCP (502) at perimeter firewalls.
- Inventory all Pro 3EM units and move them to a segmented, monitored VLAN with strict host allow‑lists.
- Implement Modbus anomaly detection and log all Modbus traffic to the SIEM.
- Contact Shelly for patch status and prepare for staged firmware upgrades or device replacement.
- Treat the advisory as authoritative and continue to monitor MITRE/NVD for CVE‑2025‑12056 enrichment and vendor bulletins.
The vulnerability is fixable from a vendor‑patch perspective, but until Shelly publishes and operators apply a fix, defense‑in‑depth and network controls are the only reliable ways to avoid service disruption. For organizations that cannot isolate affected meters quickly, consider planned maintenance windows to replace or remove exposed units — the operational risk of an uncontrolled reboot chain can be greater than the cost of temporary manual operation.
Shelly’s product documentation confirms Modbus is a core integration mechanism for the Pro 3EM, which explains why this specific parsing flaw is impactful; earlier Shelly product CVEs and community Modbus observations establish precedent for both the attack surface and the kinds of firmware parsing errors that lead to denial‑of‑service. Operators must assume exposure until proven otherwise, apply the containment measures laid out above, and track vendor and national vulnerability feeds for a definitive patch and remediation timeline.
Source: CISA Shelly Pro 3EM | CISA