CVE-2025-28381

7.5 HIGH

📋 TL;DR

OpenC3 COSMOS versions before 6.0.2 expose service credentials as environment variables in all containers, allowing attackers to access sensitive authentication data. This affects all deployments using vulnerable versions of the OpenC3 COSMOS mission framework.

💻 Affected Systems

Products:
  • OpenC3 COSMOS
Versions: All versions before 6.0.2
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all container deployments using the vulnerable OpenC3 COSMOS framework.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to all services and systems that use the leaked credentials, potentially leading to complete system compromise, data exfiltration, and lateral movement.

🟠

Likely Case

Attackers harvest credentials to access backend services, databases, or external APIs, leading to unauthorized data access and privilege escalation.

🟢

If Mitigated

Limited credential exposure with minimal impact if strong network segmentation and credential rotation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to container environment variables, which may be accessible through various container management interfaces or compromised containers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.2

Vendor Advisory: https://github.com/OpenC3/cosmos/releases/tag/v6.0.2

Restart Required: Yes

Instructions:

1. Update OpenC3 COSMOS to version 6.0.2 or later. 2. Restart all containers and services. 3. Rotate all exposed credentials as a precaution.

🔧 Temporary Workarounds

Credential Rotation

all

Manually rotate all service credentials that may have been exposed as environment variables.

Environment Variable Restriction

all

Restrict access to container environment variables through container runtime security controls.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to containers and their management interfaces.
  • Deploy runtime security monitoring to detect unauthorized access attempts to container environments.

🔍 How to Verify

Check if Vulnerable:

Check if OpenC3 COSMOS version is below 6.0.2 by examining the deployment configuration or running 'docker inspect' on containers to check for exposed environment variables containing credentials.

Check Version:

Check the OpenC3 COSMOS version in your deployment configuration or container images.

Verify Fix Applied:

Verify the OpenC3 COSMOS version is 6.0.2 or later and confirm that environment variables no longer contain sensitive credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to container management APIs
  • Unusual credential usage patterns from container IPs

Network Indicators:

  • Suspicious outbound connections from containers to credential-related services

SIEM Query:

source="container_logs" AND (event="env_access" OR credential_terms)

🔗 References

📤 Share & Export