CVE-2025-67013

6.5 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in ETL Systems Ltd DEXTRA Series Digital L-Band Distribution System web management interface. Attackers can trick authenticated administrators into performing unauthorized configuration changes without their knowledge. This affects organizations using the vulnerable version of this satellite communication equipment management system.

💻 Affected Systems

Products:
  • ETL Systems Ltd DEXTRA Series Digital L-Band Distribution System
Versions: v1.8
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface configuration endpoints. All installations with the vulnerable version are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers reconfigure the distribution system to disrupt satellite communications, reroute signals, or disable critical functionality.

🟠

Likely Case

Unauthorized configuration changes leading to service disruption, signal manipulation, or system instability requiring manual intervention to restore proper operation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though configuration changes could still occur if administrators are tricked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks require the victim to be authenticated to the management interface. The GitHub reference contains research demonstrating the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.etlsystems.com/

Restart Required: No

Instructions:

Check vendor website for security updates. If available, download and apply the patch following vendor instructions.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all configuration endpoints in the web interface

Requires code modification - consult vendor or developer

Origin/Referer Validation

all

Implement server-side validation of Origin and Referer headers for all POST requests

Requires code modification - consult vendor or developer

🧯 If You Can't Patch

  • Segment the management interface to internal network only and restrict access to authorized administrators
  • Implement web application firewall (WAF) rules to detect and block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Test configuration endpoints for CSRF tokens and Origin/Referer validation using tools like Burp Suite or OWASP ZAP

Check Version:

Check system version through web interface or consult vendor documentation

Verify Fix Applied:

Verify that all configuration endpoints now require CSRF tokens and validate Origin/Referer headers

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration changes
  • Multiple failed authentication attempts followed by configuration requests
  • Requests from unusual IP addresses to configuration endpoints

Network Indicators:

  • HTTP POST requests to configuration endpoints without CSRF tokens
  • Requests with mismatched Origin/Referer headers

SIEM Query:

source="web_logs" AND (uri="/config/*" OR uri="/admin/*") AND method="POST" AND (NOT csrf_token=*)

🔗 References

📤 Share & Export