CVE-2023-28395

Osprey Pump Controller version 1.01 is vulnerable to a weak session token generation algorithm that can be predicted and can aid in authentication and authorization bypass. This may allow an attacker to hijack a session by predicting the session id and gain unauthorized access to the product.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:propumpservice:osprey_pump_controller_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:propumpservice:osprey_pump_controller:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-03-28 20:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-28395

Mitre link : CVE-2023-28395

CVE.ORG link : CVE-2023-28395


JSON object : View

Products Affected

propumpservice

  • osprey_pump_controller_firmware
  • osprey_pump_controller
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)