Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities

Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities

September 24, 2024 at 02:24PM

Cybersecurity warnings about vulnerabilities in automatic tank gauge (ATG) systems persist nearly a decade later, with critical security holes found in widely-deployed devices across various industries. Bitsight’s analysis revealed 10 vulnerabilities, with the potential for remote hacking leading to physical damage and financial theft. Despite their findings, the number of exposed systems has not improved.

Based on the meeting notes provided, here are the key takeaways:

1. Automatic tank gauge (ATG) systems continue to have critical vulnerabilities, posing security risks to various industries including gas stations, military bases, airports, hospitals, and power plants.

2. Several cybersecurity companies, including Bitsight, have identified security holes in ATG systems from different vendors, impacting products such as Maglink LX and LX4, OPW SiteSentinel, Proteus OEL8000, Alisonic Sibylla, and Franklin TS-550.

3. The identified vulnerabilities range from critical severity ratings, including authentication bypass, hardcoded credentials, OS command execution, and SQL injection issues, to high-severity XSS, privilege escalation, and arbitrary file read issues.

4. Exploiting these vulnerabilities could lead to full administrator privileges of the device application, full operating system access, and potential physical damage, including causing fuel leaks, disabling alarms, and damaging components.

5. Threat actors could also cause indirect damage by monitoring sales, silently stealing fuel, conducting kinetic attacks on critical infrastructures, and using the devices as a means to pivot into internal networks.

6. Thousands of exposed and vulnerable ATG devices, particularly in the United States and Europe, have been identified by Bitsight, with no improvement in exposure numbers between June and September.

7. While impacted vendors have been notified through the US cybersecurity agency CISA, it remains unclear which vendors have taken action and which vulnerabilities have been patched.

Please let me know if you need further information or details on any specific aspect of the meeting notes.

Full Article