CVE-2024-2442

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in Franklin Fueling System EVO 550 and EVO 5000 allows attackers to access sensitive files on the system by manipulating file paths. This affects organizations using these specific fuel management systems, potentially exposing configuration files, credentials, or other sensitive data.

💻 Affected Systems

Products:
  • Franklin Fueling System EVO 550
  • Franklin Fueling System EVO 5000
Versions: All versions prior to patched versions
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: These are industrial control systems used in fuel management infrastructure at gas stations and similar facilities.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through access to configuration files containing credentials, enabling further attacks on fuel management infrastructure or adjacent systems.

🟠

Likely Case

Unauthorized access to sensitive files containing system configurations, logs, or potentially credentials, leading to information disclosure and possible credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-079-01

Restart Required: Yes

Instructions:

1. Review CISA advisory ICSA-24-079-01. 2. Contact Franklin Fueling Systems for patched firmware. 3. Schedule maintenance window. 4. Backup configurations. 5. Apply firmware update. 6. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EVO systems from untrusted networks and internet access

Access Control Lists

all

Restrict network access to EVO systems to only authorized management stations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EVO systems from untrusted networks
  • Monitor network traffic to/from EVO systems for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory; test with controlled path traversal attempts if authorized

Check Version:

Check through EVO system management interface or consult vendor documentation

Verify Fix Applied:

Verify firmware version matches patched version from vendor; test that path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests with ../ sequences
  • Access to sensitive system files

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\) to EVO systems

SIEM Query:

source_ip="EVO_System_IP" AND (http_uri="*../*" OR http_uri="*..\*")

🔗 References

📤 Share & Export