The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a security advisory highlighting two severe vulnerabilities in Veeder-Root's TLS4B Automatic Tank Gauge (ATG) System, a critical component used worldwide in the energy sector to monitor fuel storage tanks. The most critical of these flaws, CVE-2025-58428, is a command injection vulnerability rated 9.9 on the CVSS scale. It could allow a remote attacker with valid credentials to gain full control of the industrial control system (ICS), creating risks of fuel supply disruption, inaccurate inventory, and potential safety hazards. A second flaw, CVE-2025-55067, is an integer overflow issue tied to the Y2038 epoch rollover that could lead to a denial-of-service. Veeder-Root has released a patch for the critical command injection flaw, and CISA is urging all affected organizations to take immediate action.
This vulnerability, discovered by researchers at Bitsight, exists in the SOAP-based web services interface of the TLS4B system. An authenticated attacker can send a specially crafted request to inject and execute arbitrary commands on the underlying Linux operating system with root privileges. The low complexity of exploitation, combined with the potential for full system takeover, contributes to its near-maximum severity score. A successful exploit could allow an attacker to manipulate fuel level readings, disable leak detection alarms, or disrupt fuel dispensing operations.
This flaw is a manifestation of the 'Year 2038 problem,' where systems using 32-bit signed integers to store Unix time will experience an overflow on January 19, 2038. When the system clock reaches this date, it will reset to December 13, 1901. This time manipulation can cause critical functions to fail, including authentication mechanisms and leak detection algorithms. It can also be triggered prematurely by an attacker to induce a denial-of-service (DoS) condition, potentially locking administrators out of the system.
These systems are deployed globally at gas stations, airports, and other facilities that manage large quantities of fuel.
There is no known public exploitation of these vulnerabilities at this time. However, given their severity and the criticality of the affected systems, they are attractive targets for both cybercriminals and nation-state actors.
Compromise of a TLS4B ATG system could have significant consequences:
| Type | Value | Description |
|---|---|---|
| url_pattern | SOAP web service endpoints | Monitor for unusual or malformed requests to the device's web interface, particularly any that contain shell metacharacters (` |
| command_line_pattern | Shell commands spawned by web service process | On the device, monitor the web server process for any child processes corresponding to shell commands (sh, bash, ls, cat, etc.). |
| log_source | System clock logs | Anomalous, large jumps in the system time, especially to dates in the past like 1901, are a direct indicator of CVE-2025-55067 abuse. |
D3-NTA: Network Traffic Analysis to detect suspicious connections.Veeder-Root and CISA have provided the following recommendations:
D3-SU: Software Update as the primary remediation for CVE-2025-58428.D3-NI: Network Isolation as a critical compensating control for all ICS/OT devices.Applying the firmware update from Veeder-Root is the primary mitigation for the critical RCE flaw.
Mapped D3FEND Techniques:
Isolating ICS/OT devices from corporate IT networks and the internet is a fundamental security control for critical infrastructure.
Mapped D3FEND Techniques:
Isolating ICS/OT devices from corporate IT networks and the internet is a fundamental security control for critical infrastructure. (ICS Mitigation ID)
Encrypting sensitive configuration and operational data on the device.
The single most important countermeasure for protecting Industrial Control Systems like the Veeder-Root TLS4B is Network Isolation. These devices should never be directly exposed to the internet or even the corporate IT network. Asset owners must place these ATGs and other OT devices behind a series of firewalls in a dedicated, segmented OT network. All communication between the IT and OT networks should be brokered through a DMZ. This control would completely mitigate the remote attack vector for CVE-2025-58428, as an external attacker would have no path to the vulnerable SOAP interface. Even for an attacker with an initial foothold on the IT network, proper segmentation would prevent them from pivoting to the critical OT environment.
For the command injection flaw (CVE-2025-58428), immediate application of the vendor-supplied patch is the definitive solution. Organizations using Veeder-Root TLS4B systems must upgrade to firmware Version 11.A or later. Patching in OT environments can be challenging, so it must be done within a planned maintenance window and according to a tested procedure to avoid operational disruption. However, given the 9.9 CVSS score, this should be treated as an emergency change. A robust patch management program for OT systems, while difficult, is essential for defending against modern threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats