CVE-2023-36497

8.8 HIGH

📋 TL;DR

This vulnerability in Dover Fueling Solutions MAGLINK LX Web Console allows guest users to escalate their privileges to administrative level. It affects multiple versions of the MAGLINK LX Web Console Configuration software used in industrial fuel management systems. Organizations using these vulnerable versions are at risk of unauthorized administrative access.

💻 Affected Systems

Products:
  • Dover Fueling Solutions MAGLINK LX Web Console Configuration
Versions: 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, 3.3
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects guest user accounts in the web console interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the fuel management system, potentially allowing manipulation of fuel dispensing, pricing, inventory, and system configuration.

🟠

Likely Case

Unauthorized users gain administrative access to modify system settings, view sensitive operational data, or disrupt fuel management operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated fuel management network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires guest-level access to exploit, but the advisory suggests the vulnerability is straightforward to exploit once authenticated as guest

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Dover Fueling Solutions for patching information

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01

Restart Required: Yes

Instructions:

1. Contact Dover Fueling Solutions for patch availability
2. Apply the provided patch to affected systems
3. Restart the MAGLINK LX Web Console service
4. Verify guest users no longer have administrative privileges

🔧 Temporary Workarounds

Disable Guest Accounts

all

Remove or disable all guest user accounts in the MAGLINK LX Web Console

Network Segmentation

all

Isolate MAGLINK LX systems from general corporate networks and internet access

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the MAGLINK LX Web Console
  • Monitor for privilege escalation attempts and review access logs regularly

🔍 How to Verify

Check if Vulnerable:

Check if MAGLINK LX Web Console is running one of the affected versions and test if guest accounts can perform administrative actions

Check Version:

Check version information in the MAGLINK LX Web Console interface or system configuration

Verify Fix Applied:

After patching, verify that guest accounts cannot access administrative functions or escalate privileges

📡 Detection & Monitoring

Log Indicators:

  • Guest user accounts performing administrative actions
  • Multiple failed privilege escalation attempts
  • Unusual administrative activity from non-admin accounts

Network Indicators:

  • Unauthorized access attempts to administrative endpoints from guest accounts
  • Traffic patterns suggesting privilege escalation

SIEM Query:

source="maglink-lx" AND (event_type="admin_action" AND user_role="guest")

🔗 References

📤 Share & Export