The TLS4B ATG system's SOAP-based interface is vulnerable due to its accessibility through the web services handler. This vulnerability enables remote attackers with valid credentials to execute system-level commands on the underlying Linux system. This could allow the attacker to achieve remote command execution, full shell access, and potential lateral movement within the network.
Advisories

No advisories yet.

Fixes

Solution

Veeder-Root recommends users upgrade the TLS4B to Version 11.A. Veeder-Root advises that their ASCs review and implement these best practices for network security with their users, when installing a new console or setting up a network port. Contact Veeder-Root Technical Support at +1.800.323.1799 for additional help or questions.


Workaround

No workaround given by the vendor.

History

Thu, 23 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Description The TLS4B ATG system's SOAP-based interface is vulnerable due to its accessibility through the web services handler. This vulnerability enables remote attackers with valid credentials to execute system-level commands on the underlying Linux system. This could allow the attacker to achieve remote command execution, full shell access, and potential lateral movement within the network.
Title Command Injection in Veeder-Root TLS4B Automatic Tank Gauge System
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-23T20:29:27.332Z

Reserved: 2025-09-23T19:56:47.992Z

Link: CVE-2025-58428

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-23T20:15:40.443

Modified: 2025-10-23T20:15:40.443

Link: CVE-2025-58428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.