Skip to main content

CVE-2025-5310: CWE-306 in Dover Fueling Solutions ProGauge MagLink LX 4

Critical
VulnerabilityCVE-2025-5310cvecve-2025-5310cwe-306
Published: Fri Jun 27 2025 (06/27/2025, 17:22:02 UTC)
Source: CVE Database V5
Vendor/Project: Dover Fueling Solutions
Product: ProGauge MagLink LX 4

Description

Dover Fueling Solutions ProGauge MagLink LX Consoles expose an undocumented and unauthenticated target communication framework (TCF) interface on a specific port. Files can be created, deleted, or modified, potentially leading to remote code execution.

AI-Powered Analysis

AILast updated: 06/27/2025, 17:54:29 UTC

Technical Analysis

CVE-2025-5310 is a critical vulnerability identified in the Dover Fueling Solutions ProGauge MagLink LX 4 consoles, which are used in fuel dispensing and management systems. The vulnerability stems from an undocumented and unauthenticated Target Communication Framework (TCF) interface exposed on a specific network port. This interface allows an attacker to create, delete, or modify files on the device without any authentication or user interaction. Such unrestricted access can lead to remote code execution (RCE), enabling an attacker to execute arbitrary commands or malicious code on the affected device. The root cause is classified under CWE-306 (Missing Authentication for Critical Function), indicating that critical functions are accessible without proper authentication controls. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over a network without privileges or user interaction. No patches are currently available, and there are no known exploits in the wild as of the publication date. Given the nature of the device—fuel management consoles—successful exploitation could disrupt fuel supply operations, cause safety hazards, or facilitate further attacks within industrial control system (ICS) environments.

Potential Impact

For European organizations, especially those operating fuel stations, logistics hubs, or industrial facilities relying on Dover Fueling Solutions equipment, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control over fuel dispensing systems, resulting in operational disruptions, financial losses, and potential safety incidents such as fuel spills or fires. The compromise of these consoles could also serve as a pivot point for attackers to infiltrate broader ICS or corporate networks, threatening critical infrastructure. Given the criticality of fuel supply chains in Europe, any disruption could have cascading effects on transportation, emergency services, and economic activities. Additionally, the lack of authentication and remote exploitability means attackers can target these devices from the internet or internal networks, increasing the attack surface. The vulnerability's severity underscores the need for immediate attention to prevent potential sabotage or espionage activities targeting European energy and transportation sectors.

Mitigation Recommendations

Immediate mitigation steps include network segmentation to isolate ProGauge MagLink LX 4 consoles from untrusted networks, especially the internet. Organizations should implement strict firewall rules to block access to the specific port exposing the TCF interface. Monitoring network traffic for unusual activity targeting this port can help detect exploitation attempts. Since no patches are currently available, deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures for this vulnerability is advisable. Physical security controls should be enforced to prevent unauthorized local access. Vendors and users should prioritize obtaining and applying official patches or firmware updates once released. Additionally, organizations should conduct thorough asset inventories to identify all affected devices and consider temporary operational workarounds, such as disabling the vulnerable interface if feasible. Regular backups and incident response plans tailored to ICS environments should be reviewed and updated to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-05-28T21:03:37.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ed7556f40f0eb7265731a

Added to database: 6/27/2025, 5:39:33 PM

Last enriched: 6/27/2025, 5:54:29 PM

Last updated: 7/16/2025, 1:26:28 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats