Critical Vulnerability in Dover Fueling Solutions MAGLINK LX Console
Take action: If you are using a vulnerable Dover Fueling Solutions MAGLINK LX Console, replace it with a new version. If that's not an option, isolate the console in a non-exposed network and use VPN to connect to the console.
Learn More
CISA reports high severity and critical severity flaws in Dover Fueling Solutions MAGLINK LX Console. Dover Fueling Solutions (DFS), a part of Dover Corporation that delivers advanced fuel dispensing equipment, electronic systems and payment, fleet systems, automatic tank gauging and wetstock management. MAGLINK LX Console is provides monitoring of fuel tanks.
Successful exploitation of these vulnerabilities could grant an attacker full system access. The vulnerabilities are tracked as:
- CVE-2023-41256 (CVSS3 score 9.1) - AUTHENTICATION BYPASS VIA ALTERNATE PATH OR CHANNEL - This vulnerability allows unauthorized access by bypassing authentication, potentially granting an attacker user access via the MAGLINK LX Web Console.
- CVE-2023-36497 (CVSS3 score 8.8) - INADEQUATE ACCESS CONTROL - The affected product may permit a guest user to escalate privileges to admin status through the MAGLINK LX Web Console.
- CVE-2023-38256 (CVSS3 score 6.8) - PATH TRAVERSAL - This vulnerability exposes the system to a path traversal attack, potentially allowing an attacker to access stored files.
The following versions of MAGLINK LX Web Console Configuration are affected:
- MAGLINK LX Web Console Configuration: version 2.5.1
- MAGLINK LX Web Console Configuration: version 2.5.2
- MAGLINK LX Web Console Configuration: version 2.5.3
- MAGLINK LX Web Console Configuration: version 2.6.1
- MAGLINK LX Web Console Configuration: version 2.11
- MAGLINK LX Web Console Configuration: version 3.0
- MAGLINK LX Web Console Configuration: version 3.2
- MAGLINK LX Web Console Configuration: version 3.3*
Dover Fueling Solutions announced the end-of-life for MAGLINK LX 3 in 2023 and released MAGLINK LX 4, which addresses these vulnerabilities. CISA recommends defensive measures to reduce the risk of exploitation, including network exposure minimization, firewall placement, and the use of secure remote access methods like VPNs.
No known public exploitation targeting these vulnerabilities has been reported.