CVE-2025-30519
Dover · Dover Fueling Solutions ProGauge MagLink Multiple Products
A critical vulnerability exists in Dover Fueling Solutions ProGauge MagLink devices due to unchangeable default root credentials.
Executive summary
A critical vulnerability exists in Dover Fueling Solutions ProGauge MagLink devices due to unchangeable default root credentials. An attacker with network access can use these credentials to gain complete control of the system, potentially leading to operational disruption, fuel theft, and manipulation of sensitive monitoring data. Immediate patching is required to prevent unauthorized access and system compromise.
Vulnerability
The affected devices, including ProGauge MagLink LX4 models, are shipped with hardcoded default credentials for the root (administrative) user. Crucially, these credentials cannot be altered or disabled through standard administrative functions. An attacker with network access to the device's management interface can authenticate using these static credentials to gain privileged, root-level access, allowing for complete system compromise.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker complete control over the fuel tank gauging and management system. This could lead to severe business consequences, including the manipulation of fuel inventory data to conceal theft, disruption of fuel dispensing operations, alteration of environmental compliance logs leading to regulatory fines, and the potential for a complete shutdown of fueling station operations. The direct risks include significant financial loss, reputational damage, and potential safety hazards associated with the mismanagement of fuel infrastructure.
Remediation
Immediate Action: Apply the vendor-provided security patch immediately. The primary remediation is to Update Dover Fueling Solutions ProGauge MagLink Multiple Products to the latest version, which addresses the hardcoded credentials issue. After updating, administrators should review system access logs for any evidence of unauthorized access attempts that may have occurred prior to patching.
Proactive Monitoring: Implement continuous monitoring of affected devices. Security teams should look for login attempts using the default root account from unrecognized IP addresses, unusual or off-hours access patterns, and any unexpected configuration changes. Network monitoring should be configured to alert on suspicious traffic to or from the MagLink devices.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
- Network Segmentation: Isolate the MagLink devices on a restricted network segment, separate from primary business and guest networks.
- Access Control: Implement strict firewall rules and Access Control Lists (ACLs) to ensure that only authorized administrative personnel and systems can communicate with the device's management interface.
- Physical Security: Ensure strong physical security controls are in place to prevent unauthorized local network access to the devices.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the critical CVSS score of 9.8 and the extremely low complexity of exploitation, this vulnerability represents a significant and immediate risk to organizations using the affected products. We strongly recommend that all available patches from Dover Fueling Solutions be applied on an emergency basis. If patching is delayed, the compensating controls listed above, particularly network segmentation and strict access controls, must be implemented immediately to mitigate the risk of compromise. Although not yet on the CISA KEV list, its severity makes it a high-priority candidate for remediation.