CVE-2023-5846

8.3 HIGH

📋 TL;DR

This vulnerability allows attackers to decode administrator credentials on Franklin Fueling System TS-550 devices, enabling unauthenticated access. Organizations using TS-550 versions prior to 1.9.23.8960 are affected, particularly those in critical infrastructure sectors like fuel distribution.

💻 Affected Systems

Products:
  • Franklin Fueling System TS-550
Versions: All versions prior to 1.9.23.8960
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the TS-550 fuel management controller used in fuel dispensing systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of fuel management systems, potentially manipulating fuel dispensing, disabling safety controls, or disrupting critical infrastructure operations.

🟠

Likely Case

Unauthorized access to device configuration, monitoring data, and potential manipulation of fueling operations or billing systems.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though credential exposure remains a significant concern.

🌐 Internet-Facing: HIGH - If devices are exposed to the internet, attackers can remotely exploit this without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves credential decoding rather than complex exploitation, making it relatively easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.23.8960

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04

Restart Required: Yes

Instructions:

1. Contact Franklin Fueling Systems for firmware update 1.9.23.8960. 2. Backup device configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate TS-550 devices from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules limiting access to TS-550 management interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TS-550 devices from untrusted networks
  • Monitor network traffic to TS-550 devices for unauthorized access attempts and credential decoding activities

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is below 1.9.23.8960, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or via serial console connection

Verify Fix Applied:

Verify firmware version shows 1.9.23.8960 or higher in device management interface.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin access
  • Unusual admin login times or locations
  • Configuration changes from unexpected sources

Network Indicators:

  • HTTP requests to TS-550 management interface from unexpected IPs
  • Traffic patterns suggesting credential decoding attempts
  • Unauthorized access to admin endpoints

SIEM Query:

source_ip=* AND dest_ip=[TS-550_IP] AND (http_method=POST AND uri CONTAINS "/login" OR uri CONTAINS "/admin")

🔗 References

📤 Share & Export