CVE-2023-35793
📋 TL;DR
This CSRF vulnerability in Cassia Access Controller allows attackers to trick authenticated users into performing unauthorized web SSH actions to gateways. It affects organizations using Cassia Access Controller 2.1.1.2303271039 for IoT device management.
💻 Affected Systems
- Cassia Access Controller
📦 What is this software?
Access Controller by Cassianetworks
⚠️ Risk & Real-World Impact
Worst Case
Attackers could establish unauthorized SSH connections to gateways, potentially gaining control over IoT devices, intercepting data, or launching further attacks within the network.
Likely Case
Attackers could perform unauthorized SSH operations on gateways, potentially modifying configurations, accessing device data, or disrupting IoT device communications.
If Mitigated
With proper CSRF protections and network segmentation, impact is limited to isolated gateway management functions without broader network compromise.
🎯 Exploit Status
Exploitation requires tricking an authenticated user into visiting a malicious webpage while logged into the Access Controller.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not found in provided references
Restart Required: No
Instructions:
No official patch available. Check Cassia Networks website for security updates or contact vendor support.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection tokens to web SSH session requests
Requires application code modification
Disable Web SSH
allDisable web SSH functionality if not required
Configuration dependent - check Cassia documentation
🧯 If You Can't Patch
- Implement network segmentation to isolate Access Controller from critical systems
- Use browser extensions that block CSRF attacks and educate users about phishing risks
🔍 How to Verify
Check if Vulnerable:
Check if running Cassia Access Controller version 2.1.1.2303271039 with web SSH enabled
Check Version:
Check web interface or system configuration for version information
Verify Fix Applied:
Test web SSH functionality with CSRF testing tools like Burp Suite or OWASP ZAP
📡 Detection & Monitoring
Log Indicators:
- Unexpected SSH session establishments
- Multiple failed authentication attempts from same source
Network Indicators:
- Unusual SSH traffic patterns from web interface
- Cross-origin requests to web SSH endpoints
SIEM Query:
source="cassia_access_controller" AND (event="ssh_session" OR event="web_ssh") AND user!=expected_user
🔗 References
- https://blog.kscsc.online/cves/202335793/md.html
- https://github.com/Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH
- https://www.cassianetworks.com/products/iot-access-controller/
- https://blog.kscsc.online/cves/202335793/md.html
- https://github.com/Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH
- https://www.cassianetworks.com/products/iot-access-controller/