Multiple vulnerabilities in Dover Fueling Solutions MAGLINK LX Console



Published: 2023-09-08
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2023-41256
CVE-2023-36497
CVE-2023-38256
CWE-ID CWE-288
CWE-284
CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
MAGLINK LX Web Console Configuration
Hardware solutions / Other hardware appliances

Vendor Dover Fueling Solutions

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Authentication bypass using an alternate path or channel

EUVDB-ID: #VU80553

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-41256

CWE-ID: CWE-288 - Authentication Bypass Using an Alternate Path or Channel

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an authentication bypass using an alternate path. A remote attacker can obtain user access by leveraging the MAGLINK LX Web Console.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

MAGLINK LX Web Console Configuration: 2.5.1 - 3.3

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU80554

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-36497

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain elevated privileges by leveraging the MAGLINK LX Web Console.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

MAGLINK LX Web Console Configuration: 2.5.1 - 3.3

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Path traversal

EUVDB-ID: #VU80555

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38256

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

MAGLINK LX Web Console Configuration: 2.5.1 - 3.3

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###