Skip to main content

CVE-2025-46743: CWE-352 Cross-Site Request Forgery (CSRF) in Schweitzer Engineering Laboratories SEL Blueframe OS

Medium
VulnerabilityCVE-2025-46743cvecve-2025-46743cwe-352
Published: Mon May 12 2025 (05/12/2025, 16:14:05 UTC)
Source: CVE
Vendor/Project: Schweitzer Engineering Laboratories
Product: SEL Blueframe OS

Description

An authenticated user's token could be used by another source after the user had logged out prior to the token expiring.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:35:26 UTC

Technical Analysis

CVE-2025-46743 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SEL Blueframe OS, a product developed by Schweitzer Engineering Laboratories. The vulnerability arises because an authenticated user's session token remains valid and can be reused by another source even after the user has logged out, provided the token has not yet expired. This flaw allows an attacker to craft malicious requests that can be executed with the privileges of the authenticated user without their consent. The vulnerability requires that the attacker have some level of authenticated access (PR:L) and that the user performs some interaction (UI:R), such as clicking a malicious link. The attack vector is network-based (AV:N), meaning exploitation can occur remotely over the network. The vulnerability impacts the integrity of the system (I:H) by allowing unauthorized actions to be performed, with a low impact on availability (A:L) and no direct impact on confidentiality (C:N). The CVSS 3.1 base score is 6.3, categorizing it as a medium severity vulnerability. No known exploits are currently reported in the wild, and no patches have been published yet. The root cause is a failure to properly invalidate or bind session tokens upon logout, which is a common CSRF weakness (CWE-352). Given that SEL Blueframe OS is used primarily in industrial control systems and critical infrastructure environments, this vulnerability could be leveraged to perform unauthorized control commands or configuration changes if exploited.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, utilities, and manufacturing, this vulnerability poses a significant risk. SEL Blueframe OS is commonly deployed in industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments, which are integral to the operation of power grids and industrial automation. Exploitation could allow attackers to perform unauthorized commands or configuration changes, potentially disrupting operations or causing physical damage. Although the vulnerability does not directly compromise confidentiality, the integrity impact is high, which can lead to operational disruptions or safety incidents. The requirement for authenticated access and user interaction limits the ease of exploitation but does not eliminate the risk, especially in environments where users have elevated privileges and may be targeted via phishing or social engineering. The lack of patches increases the urgency for European organizations to implement compensating controls to mitigate potential exploitation. Given the strategic importance of energy and industrial sectors in Europe, this vulnerability could be leveraged in targeted attacks aiming to disrupt critical infrastructure.

Mitigation Recommendations

European organizations using SEL Blueframe OS should immediately review and enhance their session management and authentication controls. Specific recommendations include: 1) Implement strict session token invalidation upon logout to prevent reuse; 2) Employ anti-CSRF tokens or same-site cookie attributes to mitigate CSRF attack vectors; 3) Restrict user privileges to the minimum necessary to reduce the impact of compromised sessions; 4) Monitor and log unusual or unauthorized commands and session activities for early detection; 5) Educate users on phishing and social engineering risks to reduce the likelihood of malicious user interactions; 6) Network segmentation and firewall rules should limit access to SEL Blueframe OS interfaces to trusted hosts only; 7) Deploy web application firewalls (WAF) with CSRF protection capabilities; 8) Coordinate with Schweitzer Engineering Laboratories for timely patch releases and apply updates as soon as they become available; 9) Conduct regular security assessments and penetration testing focused on session management and CSRF vulnerabilities in ICS environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEL
Date Reserved
2025-04-28T21:27:38.848Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6b3b

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:35:26 AM

Last updated: 7/26/2025, 7:38:32 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats