Over 5K Gas Station Tank Gauges Sit Exposed on the Public Net
One gas station failed its PCI compliance test due to security holes in its automated gas tank gauge configuration, researcher says.
It's been three years since researchers first discovered automated tank gauges (ATGs) at some 5,000 US gas stations exposed on the public Internet without password protection, and a recent scan found 5,635 locations were vulnerable to the same issue.
The 2015 finding led by HD Moore, then the chief research officer at Rapid7, scanned for devices with TCP port 10001 open on the Internet. Jack Chadowitz, president and CEO of BostonBase, a fuel industry technology firm, says he not only found the overwhelming number of ATG systems vulnerable to the initial flaw, but also stumbled upon another vulnerability in the Vedeer-Root TLS450 tank gauges that may have led to a New Bedford, N.H., gas station failing its PCI DSS compliance audit.
Chadowitz says the exposed gas stations' tank gauge data can be accessed by attackers as well as manipulated for fuel theft or other sabotage. When he contacted the owner of the New Hampshire gas station this spring to alert him about the exposed ATG, the owner – who had deployed password protection with his Vedeer-Root application - noted that he had recently failed his PCI test. The station was running an older version of OpenSSH 7.0 on port 22, which apparently had been set up for remote access by its third-party supplier of the ATG system for maintenance purposes.
According to BostonBase, the open port and dated version of OpenSSH used in the ATG system led to the failed PCI compliance test. "A lot of [smaller] gas stations don't do PCI testing … but that this one did is one of the reasons why I happened to come across this vulnerability. It's probably very rare, this combination of Vedeer with OpenSSH 7.0 and having the port opened," Chadowitz says.
Vedeer-Root maintains that the issue raised by Chadowitz would be nonexistent if users properly configure the devices with strong passwords and place them behind a firewall. "Users need to maintain proper network safeguards, as they would for any other Internet-connected device in order to prevent outside traffic. This includes the use of firewalls and strong passwords," says Alan English, director of brand development for Vedeer-Root.
These security issues surrounding ATGs is yet another example of security challenges with industrial Internet of Things devices. In the Vedeer-Root case, it also underscores the challenges of getting third-party suppliers on board security-wise, especially on behalf of smaller businesses like local gas stations.
ATGs provide gasoline inventory and protect groundwater from gasoline leaks, notes Chadowitz. "Anyone can go in and mess with a tank gauge" that's exposed online by altering the parameters for a high-water alarm, for example. "How can you trust it?"
Trend Micro also conducted its own gas tank research in 2015, and found examples of hackers messing with the devices, specifically the Guardian AST gas tank monitoring systems in several locations across the US. The Trend researchers reported finding an Internet-facing tank monitoring system at a gas station in Holden, Maine, renamed "We_Are_Legion" from "Diesel," suggesting either the handiwork of Anonymous or another attacker using the group's slogan.
Mark Nunnikhoven, vice president of cloud research for Trend Micro, says the biggest threats to vulnerable ATGs today is to the gas station's business. "The most concerning is someone using manipulation of them to get free fuel, or to change gas readings, hitting the core of their [the station's] business," he says. "A director motivator is profit there, and that's the most likely scenario."
But Chadowitz says attacks could be more nefarious and destructive, causing chaos by adjusting fuel levels to appear empty at multiple stations, for example. "If they want to shut down a bunch of them, that would really cause havoc."
He recommends firewall routers in front of the ATG systems be configured with Access Control Lists (ACLs) that only allow specific IP addresses access to them, for example. "You could also put in a VPN," he says.
Gas station owners can check for the 2015 vulnerability in their ATGs on his firm's test website, kachoolie.com.
Related Content
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024