Multiple vulnerabilities in Dover Fueling Solutions ProGauge MAGLINK LX CONSOLE



| Updated: 2024-10-25
Risk High
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2024-45066
CVE-2024-43693
CVE-2024-45373
CVE-2024-43423
CVE-2024-43692
CVE-2024-41725
CWE-ID CWE-77
CWE-269
CWE-259
CWE-288
CWE-79
Exploitation vector Network
Public exploit N/A
Vulnerable software
ProGauge MAGLINK LX CONSOLE
Hardware solutions / Firmware

ProGauge MAGLINK LX4 CONSOLE
Hardware solutions / Firmware

Vendor Dover Fueling Solutions

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Command Injection

EUVDB-ID: #VU97692

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-45066

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in the ProGauge MAGLINK LX CONSOLE IP sub-menu. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Command Injection

EUVDB-ID: #VU97693

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-43693

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper privilege management

EUVDB-ID: #VU97694

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-45373

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges.

The vulnerability exists due to improper privilege management. A remote user can escalate privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use of Hard-coded Password

EUVDB-ID: #VU97695

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-43423

CWE-ID: CWE-259 - Use of Hard-coded Password

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use a hard-coded password in the web application for ProGauge MAGLINK LX4 CONSOLE. A remote attacker can gain access to administrative-level user account.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Authentication bypass using an alternate path or channel

EUVDB-ID: #VU97698

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-43692

CWE-ID: CWE-288 - Authentication Bypass Using an Alternate Path or Channel

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the authentication bypass using an alternate path or channel. A remote attacker can directly request the ProGauge MAGLINK LX CONSOLE resource sub page with full privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Cross-site scripting

EUVDB-ID: #VU97699

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41725

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the ProGauge MAGLINK LX CONSOLE. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ProGauge MAGLINK LX CONSOLE: 3.4.2.2.6

ProGauge MAGLINK LX4 CONSOLE: 4.17.9e

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###