CVE-2023-28395

Osprey Pump Controller version 1.01 is vulnerable to a weak session token generation algorithm that can be predicted and can aid in authentication and authorization bypass. This may allow an attacker to hijack a session by predicting the session id and gain unauthorized access to the product.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:propumpservice:osprey_pump_controller_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:propumpservice:osprey_pump_controller:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.3
References () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 - Third Party Advisory, US Government Resource

Information

Published : 2023-03-28 20:15

Updated : 2024-11-21 07:54


NVD link : CVE-2023-28395

Mitre link : CVE-2023-28395

CVE.ORG link : CVE-2023-28395


JSON object : View

Products Affected

propumpservice

  • osprey_pump_controller
  • osprey_pump_controller_firmware
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)