CVE-2023-28718

7.1 HIGH

📋 TL;DR

CVE-2023-28718 is a Cross-Site Request Forgery (CSRF) vulnerability in Osprey Pump Controller version 1.01 that allows attackers to perform unauthorized actions with administrative privileges. An attacker can trick a logged-in administrator into visiting a malicious website, which then sends forged HTTP requests to the controller. This affects all users of Osprey Pump Controller version 1.01 in industrial control system environments.

💻 Affected Systems

Products:
  • Osprey Pump Controller
Versions: Version 1.01
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.01 are vulnerable. The vulnerability exists in the web interface component of the controller.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of pump controller allowing remote attackers to modify pump operations, disable safety controls, or cause physical damage to industrial systems.

🟠

Likely Case

Unauthorized configuration changes to pump settings, disruption of industrial processes, or data exfiltration from the controller.

🟢

If Mitigated

Limited impact with proper network segmentation and CSRF protections in place, potentially only affecting non-critical configuration changes.

🌐 Internet-Facing: HIGH - If the controller is exposed to the internet, attackers can easily exploit this via malicious websites.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this vulnerability through phishing or malicious internal websites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be logged into the controller and visit a malicious website. No authentication bypass is needed as the attack uses the victim's existing session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.02 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06

Restart Required: Yes

Instructions:

1. Contact Osprey vendor for patch version 1.02 or later. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart controller. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all state-changing HTTP requests

Requires custom web application modifications - consult vendor for implementation details

Network Segmentation

all

Isolate pump controller network from general corporate and internet access

Configure firewall rules to restrict access to controller IP/port from trusted networks only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controller from internet and untrusted networks
  • Use browser extensions that block CSRF attacks and enforce same-origin policies for controller access

🔍 How to Verify

Check if Vulnerable:

Check controller web interface version via admin panel or SSH into controller and check firmware version

Check Version:

ssh admin@controller_ip 'show version' or check web interface admin panel

Verify Fix Applied:

Verify firmware version is 1.02 or later in admin panel and test CSRF protection by attempting to submit forms without proper tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-change requests from same IP
  • Configuration changes without corresponding admin login events
  • HTTP POST requests missing CSRF tokens

Network Indicators:

  • HTTP requests to controller from unexpected sources
  • Cross-origin requests to controller endpoints
  • Sudden configuration changes via web interface

SIEM Query:

source="osprey-controller" AND (http_method="POST" OR http_method="PUT") AND NOT csrf_token=*

🔗 References

📤 Share & Export