CVE-2024-45495

4.3 MEDIUM

📋 TL;DR

MSA FieldServer Gateway versions 5.0.0 through 6.5.2 have a cross-origin WebSocket hijacking vulnerability that allows attackers to establish WebSocket connections from malicious websites to the gateway. This affects industrial control systems and building automation networks using these gateways for protocol translation.

💻 Affected Systems

Products:
  • MSA FieldServer Gateway
Versions: 5.0.0 through 6.5.2
Operating Systems: All supported OS for FieldServer Gateway
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where WebSocket functionality is enabled, which is common for real-time industrial data exchange.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept or manipulate real-time industrial control data, potentially causing operational disruptions or safety incidents in critical infrastructure.

🟠

Likely Case

Unauthorized data exfiltration from industrial control systems, exposure of sensitive operational data, or injection of false data into monitoring systems.

🟢

If Mitigated

Limited impact due to network segmentation and proper WebSocket origin validation, with only non-critical data exposure possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into visiting malicious websites while authenticated to the gateway, but no authentication is needed for the WebSocket connection itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.3 or later

Vendor Advisory: https://us.msasafety.com/security-notices

Restart Required: Yes

Instructions:

1. Download latest firmware from MSA FieldServer support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or local console. 4. Restart gateway. 5. Verify version shows 6.5.3 or higher.

🔧 Temporary Workarounds

Implement WebSocket Origin Validation

all

Configure reverse proxy or web server to validate WebSocket origin headers before forwarding to FieldServer Gateway.

# Example nginx configuration:
location /ws {
    if ($http_origin !~ "^https?://trusted-domain\.com$") {
        return 403;
    }
    proxy_pass http://fieldserver:port;
    proxy_http_version 1.1;
    proxy_set_header Upgrade $http_upgrade;
    proxy_set_header Connection "upgrade";
}

Disable Unnecessary WebSocket Endpoints

all

Disable WebSocket functionality for non-essential services in FieldServer configuration.

# Access FieldServer web interface > Configuration > Web Services > Disable WebSocket for non-critical protocols

🧯 If You Can't Patch

  • Network segmentation: Isolate FieldServer Gateway from user workstations and internet access.
  • Implement strict Same-Origin Policy enforcement at network perimeter or reverse proxy.

🔍 How to Verify

Check if Vulnerable:

Check FieldServer Gateway web interface > About page for version number. If version is between 5.0.0 and 6.5.2 inclusive, system is vulnerable.

Check Version:

curl -k https://fieldserver-ip/about | grep -i version

Verify Fix Applied:

After patching, verify version shows 6.5.3 or higher in web interface > About page. Test WebSocket connections only accept requests from configured origins.

📡 Detection & Monitoring

Log Indicators:

  • WebSocket connection attempts from unexpected origins
  • Multiple failed WebSocket handshakes
  • Unusual WebSocket traffic patterns

Network Indicators:

  • WebSocket traffic to FieldServer Gateway from non-authorized sources
  • Cross-origin WebSocket requests without proper validation

SIEM Query:

source="fieldserver-logs" AND (event="websocket_connection" AND origin!="*trusted-domain*")

🔗 References

📤 Share & Export