The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory regarding a critical vulnerability in OPW Fuel Management Systems’ SiteSentinel product. The flaw, tracked as CVE-2024-8310, involves missing authentication for critical functions, potentially allowing attackers to bypass security protocols and gain full administrative control of affected servers. The vulnerability, rated with a CVSS v4 score of 9.3, poses significant risks, particularly to critical infrastructure sectors like energy and transportation systems where the product is widely deployed globally.
The vulnerability stems from a lack of authentication mechanisms within SiteSentinel versions released before 17Q2.1. An attacker could exploit this flaw remotely with low attack complexity, gaining unauthorized access to sensitive system configurations. The vulnerability allows control over key system functionalities without requiring prior credentials. This severe issue was reported to CISA by security researcher Pedro Umbelino from Bitsight, underscoring the urgency of mitigation efforts.
To address the risk, OPW Fuel Management Systems’ parent company, Dover Fueling Systems (DFS), advises organizations to upgrade SiteSentinel to version 17Q2.1 or later. For newer products, DFS recommends confirming that systems have the appropriate security patches installed. Additionally, placing SiteSentinel behind a firewall is strongly encouraged to reduce potential exposure. DFS service providers are available to assist with upgrades and system fixes.
CISA recommends further protective measures such as using secure remote access methods like VPNs and performing regular system updates. The agency also highlights its resources on industrial control system (ICS) security, including best practices for defending critical infrastructure. Organizations are urged to remain vigilant, conduct impact assessments, and report suspicious activity to CISA to help prevent and mitigate potential cyber incidents.
Reference: