Lucene search

K
cve[email protected]CVE-2023-28398
HistoryMar 28, 2023 - 9:15 p.m.

CVE-2023-28398

2023-03-2821:15:11
CWE-287
web.nvd.nist.gov
21
cve-2023-28398
osprey pump controller
unauthenticated user
bypass authentication
unauthorized access
threat actor
vulnerability
pump controller
disruption
data modification

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.3%

Osprey Pump Controller version 1.01 could allow an unauthenticated user to create an account and bypass authentication, thereby gaining unauthorized access to the system. A threat actor could exploit this vulnerability to create a user account without providing valid credentials. A threat actor who successfully exploits this vulnerability could gain access to the pump controller and cause disruption in operation, modify data, or shut down the controller.

Affected configurations

NVD
Node
propumpserviceosprey_pump_controller_firmwareMatch1.01
AND
propumpserviceosprey_pump_controllerMatch-

CNA Affected

[
  {
    "vendor": "ProPump and Controls, Inc.",
    "product": "Osprey Pump Controller",
    "versions": [
      {
        "status": "affected",
        "version": "1.01"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.3%

Related for CVE-2023-28398