CVE-2025-2567

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows attackers to modify or disable settings in Automated Tank Gauging (ATG) systems, disrupting fuel monitoring and supply chain operations. This affects industrial control systems used in fuel storage and transportation facilities, potentially creating safety hazards.

💻 Affected Systems

Products:
  • Automated Tank Gauging (ATG) systems from unspecified vendors
Versions: Specific versions not detailed in advisory
Operating Systems: Industrial control system platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with CWE-306 (Missing Authentication for Critical Function) in ATG monitoring components

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of fuel monitoring capability leading to undetected leaks, overfills, or contamination, potentially causing environmental disasters, explosions, or supply chain paralysis.

🟠

Likely Case

Disruption of fuel inventory management, inaccurate fuel level readings, and temporary loss of monitoring capabilities affecting operational efficiency and safety compliance.

🟢

If Mitigated

Limited operational disruption with redundant monitoring systems catching anomalies before critical failures occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-306 suggests missing authentication allows direct manipulation of critical functions without credentials

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-05

Restart Required: No

Instructions:

1. Monitor vendor advisories for patches 2. Apply vendor-recommended updates when available 3. Test in isolated environment before production deployment

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ATG systems from untrusted networks using firewalls and VLANs

Access Control Enforcement

all

Implement strong authentication and authorization controls for ATG system access

🧯 If You Can't Patch

  • Implement network segmentation to isolate ATG systems from business networks
  • Deploy intrusion detection systems monitoring for unauthorized ATG configuration changes

🔍 How to Verify

Check if Vulnerable:

Review system logs for unauthorized configuration changes to ATG settings or check for missing authentication on critical ATG functions

Check Version:

Vendor-specific command; consult system documentation

Verify Fix Applied:

Test authentication requirements for ATG configuration functions after implementing controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes to ATG systems
  • Failed authentication attempts followed by successful configuration modifications
  • ATG monitoring service disruptions

Network Indicators:

  • Unusual network traffic to ATG system configuration ports
  • Protocol anomalies in ATG communication

SIEM Query:

source="atg_system" AND (event_type="configuration_change" AND user="unknown") OR (event_type="service_stop" AND process="atg_monitor")

🔗 References

📤 Share & Export