OPW Fuel Management Systems SiteSentinel
could allow an attacker to bypass authentication to the server and obtain full admin privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-49081 OPW Fuel Management Systems SiteSentinel could allow an attacker to bypass authentication to the server and obtain full admin privileges.
Fixes

Solution

OPW Fuel Management Systems' parent company, Dover Fueling Systems (DFS), recommends users install all versions of the product behind a firewall as primary protection. DFS recommends user running versions prior to V17Q.2.1 upgrade to V17Q.2.1. Users with products that were distributed with versions newer than V17Q.2.1 should contact DFS using the link below to confirm that their build has the required fixes. The software is available to authorized service providers for DFS products. Users should contact DFS https://www.doverfuelingsolutions.com/contact-us service providers to have the software on their system upgraded or changed.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00157}

epss

{'score': 0.00171}


Fri, 27 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Opwglobal
Opwglobal sitesentinel Firmware
CPEs cpe:2.3:o:opwglobal:sitesentinel_firmware:*:*:*:*:*:*:*:*
Vendors & Products Opwglobal
Opwglobal sitesentinel Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Sep 2024 16:45:00 +0000

Type Values Removed Values Added
Description OPW Fuel Management Systems SiteSentinel could allow an attacker to bypass authentication to the server and obtain full admin privileges.
Title OPW Fuel Management Systems SiteSentinel Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-27T19:19:33.579Z

Reserved: 2024-08-29T14:29:19.568Z

Link: CVE-2024-8310

cve-icon Vulnrichment

Updated: 2024-09-27T19:17:52.703Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-27T17:15:13.970

Modified: 2024-09-30T12:45:57.823

Link: CVE-2024-8310

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.