CVE-2024-8497

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to read a file containing administrator credentials on Franklin Fueling Systems TS-550 EVO devices. Attackers can gain administrative access to the fuel management system. Organizations using affected TS-550 EVO versions are at risk.

💻 Affected Systems

Products:
  • Franklin Fueling Systems TS-550 EVO
Versions: All versions prior to 2.26.4.8967
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the TS-550 EVO fuel management controller used in gas stations and fuel distribution systems.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of fuel management system allowing unauthorized fuel dispensing, configuration changes, and potential physical safety risks.

🟠

Likely Case

Unauthorized administrative access leading to fuel theft, operational disruption, and data manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the device.

🌐 Internet-Facing: HIGH if device is directly internet-accessible, as exploitation requires only file read access.
🏢 Internal Only: MEDIUM if device is on internal network, requiring internal attacker or compromised host.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves reading a specific file containing credentials. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.26.4.8967

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-03

Restart Required: Yes

Instructions:

1. Contact Franklin Fueling Systems for patch 2.26.4.8967. 2. Schedule maintenance window. 3. Apply firmware update via management interface. 4. Verify version update. 5. Change all administrator credentials.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate TS-550 EVO devices on separate VLAN with strict firewall rules.

Access Control Lists

all

Implement IP-based access restrictions to TS-550 management interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TS-550 devices from untrusted networks
  • Change all administrator credentials and implement credential rotation policies

🔍 How to Verify

Check if Vulnerable:

Check firmware version via TS-550 web interface or serial console. If version is below 2.26.4.8967, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or serial console command 'show version'

Verify Fix Applied:

Confirm firmware version is 2.26.4.8967 or higher via management interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to credential files
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unusual HTTP requests to TS-550 management interface
  • Traffic from unexpected sources to port 80/443 of TS-550

SIEM Query:

source="TS-550" AND (event="file_access" OR event="admin_login")

🔗 References

📤 Share & Export