Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55068: CWE-190 in Dover Fueling Solutions ProGauge MagLink LX 4

0
High
VulnerabilityCVE-2025-55068cvecve-2025-55068cwe-190
Published: Thu Sep 18 2025 (09/18/2025, 20:42:29 UTC)
Source: CVE Database V5
Vendor/Project: Dover Fueling Solutions
Product: ProGauge MagLink LX 4

Description

Dover Fueling Solutions ProGauge MagLink LX4 Devices fail to handle Unix time values beyond a certain point. An attacker can manually change the system time to exploit this limitation, potentially causing errors in authentication and leading to a denial-of-service condition.

AI-Powered Analysis

AILast updated: 09/26/2025, 01:06:04 UTC

Technical Analysis

CVE-2025-55068 is a high-severity vulnerability identified in the Dover Fueling Solutions ProGauge MagLink LX 4 devices, which are used primarily in fuel dispensing and monitoring systems. The root cause of this vulnerability is a CWE-190 (Integer Overflow or Wraparound) issue related to the handling of Unix time values. Specifically, the device firmware or software fails to correctly process Unix time values beyond a certain threshold, likely due to an integer overflow or improper boundary checking. An attacker with network access can exploit this by manually manipulating the system time on the device. This manipulation can cause errors in the device's authentication mechanisms, potentially leading to denial-of-service (DoS) conditions. The vulnerability does not require any privileges or user interaction and can be exploited remotely (AV:N/AC:L/PR:N/UI:N). The impact is primarily on the integrity and availability of the device, as authentication failures can disrupt normal operations and cause service outages. Although no known exploits are currently reported in the wild, the CVSS score of 8.2 indicates a significant risk if exploited. The affected product is critical infrastructure equipment, and disruption could have cascading effects on fuel supply chains and associated services. No patches have been released yet, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, especially those operating fuel stations or managing fuel supply infrastructure using Dover Fueling Solutions equipment, this vulnerability poses a substantial risk. Exploitation could lead to denial-of-service conditions, interrupting fuel dispensing operations and causing operational downtime. This disruption can affect retail fuel availability, logistics, and transportation sectors reliant on uninterrupted fuel supply. Additionally, authentication errors may open avenues for further exploitation or unauthorized access attempts, potentially compromising system integrity. Given the critical role of fuel infrastructure in economic and emergency services, such outages could have broader societal impacts. The vulnerability's remote exploitability without authentication increases the threat level, making it feasible for attackers to cause widespread service interruptions. European organizations must consider the potential for targeted attacks, especially in countries with extensive fuel retail networks or strategic fuel reserves.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Network segmentation and strict access controls to limit exposure of ProGauge MagLink LX 4 devices to untrusted networks. 2) Continuous monitoring of device logs and network traffic for unusual time-setting commands or authentication failures indicative of exploitation attempts. 3) Implementing strict time synchronization policies using secure NTP servers to prevent unauthorized manual time changes. 4) Employing intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies related to time manipulation or authentication errors. 5) Engaging with Dover Fueling Solutions for early patch notifications and applying updates promptly once available. 6) Conducting regular security audits and vulnerability assessments on fuel infrastructure devices to identify and remediate similar issues proactively. 7) Developing incident response plans specific to fuel infrastructure DoS scenarios to minimize operational impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-08-18T15:32:05.574Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cc6f9bc42e09d33b9ea2c0

Added to database: 9/18/2025, 8:46:19 PM

Last enriched: 9/26/2025, 1:06:04 AM

Last updated: 11/2/2025, 3:22:48 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats