CVE-2023-28395

Osprey Pump Controller version 1.01 is vulnerable to a weak session token generation algorithm that can be predicted and can aid in authentication and authorization bypass. This may allow an attacker to hijack a session by predicting the session id and gain unauthorized access to the product.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:propumpservice:osprey_pump_controller_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:propumpservice:osprey_pump_controller:-:*:*:*:*:*:*:*

History

05 Apr 2023, 01:21

Type Values Removed Values Added
CWE CWE-338
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Propumpservice osprey Pump Controller
Propumpservice osprey Pump Controller Firmware
Propumpservice
CPE cpe:2.3:h:propumpservice:osprey_pump_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:propumpservice:osprey_pump_controller_firmware:1.01:*:*:*:*:*:*:*
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 - Third Party Advisory, US Government Resource

28 Mar 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-28 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28395

Mitre link : CVE-2023-28395

CVE.ORG link : CVE-2023-28395


JSON object : View

Products Affected

propumpservice

  • osprey_pump_controller
  • osprey_pump_controller_firmware
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)