Dover Fueling Solutions Flaw Lets Attackers Control Fueling Operations

Dover Fueling Solutions Flaw Lets Attackers Control Fueling Operations

A newly disclosed critical vulnerability in Dover Fueling Solutions’ ProGauge MagLink LX consoles has sent shockwaves through the global fuel infrastructure sector.

The flaw, tracked as CVE-2025-5310, allows remote attackers to seize control of fueling operations, manipulate tank monitoring, and even deploy malware, posing a severe risk to transportation systems worldwide.

Critical Flaw Exposes Global Fuel Networks

Security researchers at Microsec, led by Souvik Kandar, uncovered the flaw and reported it to the Cybersecurity and Infrastructure Security Agency (CISA).

– Advertisement –

The vulnerability, rated with a CVSS v4 base score of 9.2 (critical), affects several versions of the ProGauge MagLink LX consoles—a mainstay in fuel and water tank monitoring across fuel stations, depots, and transport hubs globally.

Field Value
CVE CVE-2025-5310
Product(s) ProGauge MagLink LX 4, LX Plus, LX Ultimate
Affected Versions LX 4/LX Plus < 4.20.3; LX Ultimate < 5.20.3
Vulnerability Missing Authentication for Critical Function

The root of the issue lies in a missing authentication mechanism for a critical function. Specifically, the consoles expose an undocumented and unauthenticated Target Communication Framework (TCF) interface on a network port.

This “backdoor” allows anyone with network access to the device to create, delete, or modify files, potentially leading to remote code execution without requiring any credentials or user interaction. Attackers could exploit this to:

  • Take full control of monitoring units
  • Manipulate fueling operations
  • Delete system configurations, causing downtime
  • Deploy malware as a foothold for broader attacks within operational networks

Affected Products and Severity

The vulnerability impacts the following product lines:

Product Affected Versions
ProGauge MagLink LX 4 Versions < 4.20.3
ProGauge MagLink LX Plus Versions < 4.20.3
ProGauge MagLink LX Ultimate Versions < 5.20.3

Given the widespread deployment of these consoles in critical infrastructure, the potential for exploitation is significant.

Attackers could disrupt fuel supply chains, cause inventory errors, or use the devices to launch further attacks on connected systems. While no public exploitation has been reported yet, the risk profile demands urgent attention.

Organizations are also advised to conduct thorough risk assessments and implement defense-in-depth strategies to safeguard critical infrastructure assets

As the digital integration of industrial control systems accelerates, this incident underscores the urgent need for continuous vigilance and robust cybersecurity practices across all sectors of critical infrastructure.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link